Conferences related to Enterprise Security

Back to Top

ICC 2021 - IEEE International Conference on Communications

IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.


2020 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)

All topics related to engineering and technology management, including applicable analytical methods and economical/social/human issues to be considered in making engineering decisions.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


Oceans 2020 MTS/IEEE GULF COAST

To promote awareness, understanding, advancement and application of ocean engineering and marine technology. This includes all aspects of science, engineering, and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from concept design through prototypes, testing, and operational systems to sense, explore, understand, develop, use, and responsibly manage natural resources.

  • OCEANS 2018 MTS/IEEE Charleston

    Ocean, coastal, and atmospheric science and technology advances and applications

  • OCEANS 2017 - Anchorage

    Papers on ocean technology, exhibits from ocean equipment and service suppliers, student posters and student poster competition, tutorials on ocean technology, workshops and town meetings on policy and governmental process.

  • OCEANS 2016

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 500 technical papers and 150 -200 exhibits.

  • OCEANS 2015

    The Marine Technology Scociety and the Oceanic Engineering Society of the IEEE cosponor a joint annual conference and exposition on ocean science, engineering, and policy. The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2014

    The OCEANS conference covers four days. One day for tutorials and three for approx. 450 technical papers and 150-200 exhibits.

  • OCEANS 2013

    Three days of 8-10 tracks of technical sessions (400-450 papers) and concurent exhibition (150-250 exhibitors)

  • OCEANS 2012

    Ocean related technology. Tutorials and three days of technical sessions and exhibits. 8-12 parallel technical tracks.

  • OCEANS 2011

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2010

    The Marine Technology Society and the Oceanic Engineering Scociety of the IEEE cosponsor a joint annual conference and exposition on ocean science engineering, and policy.

  • OCEANS 2009

  • OCEANS 2008

    The Marine Technology Society (MTS) and the Oceanic Engineering Society (OES) of the Institute of Electrical and Electronic Engineers (IEEE) cosponsor a joint conference and exposition on ocean science, engineering, education, and policy. Held annually in the fall, it has become a focal point for the ocean and marine community to meet, learn, and exhibit products and services. The conference includes technical sessions, workshops, student poster sessions, job fairs, tutorials and a large exhibit.

  • OCEANS 2007

  • OCEANS 2006

  • OCEANS 2005

  • OCEANS 2004

  • OCEANS 2003

  • OCEANS 2002

  • OCEANS 2001

  • OCEANS 2000

  • OCEANS '99

  • OCEANS '98

  • OCEANS '97

  • OCEANS '96


2019 11th International Conference on Computational Intelligence and Communication Networks (CICN)

11th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to support intelligentsolutions for society. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication networks with the goal of exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will enhance collaboration across disciplines in order to support novel breakthroughs in the field.

  • 2018 10th International Conference on Computational Intelligence and Communication Networks (CICN)

    10th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation.

  • 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Image, Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• Digital Design, VLSI and SOC • Data Mining, Big data, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence • Power Electronics, Transmission and Power Systems • Computer Vision and Artificial Intelligence • Bio-informatics, Biometry and Medical Imaging• Information security,Network Security and Steganography • Remote sensing and GIS

  • 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN ? Sensors and networks (wireless ad hoc N/W, Vehicular N/W) ? Acoustic and under water electronics/communication and sonar systems ? Signal and Speach Processing ? Microwave IC, antennas and Wave Propagation ? Modeling and simulation ? VLSI Design and SOC ? Data Mining, Ontology and Web Services ? Parallel and distributed systems ? Telecommunication and Mobile communication ? Grid, Cloud, High Speed/Performance and Green Computing ? RFIDs and applicatons ? Embedded systems and Hardware Design/Implementation ? Mobile Computing, Computational Intelligence

  • 2015 International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• VLSI Design and SOC • Data Mining, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence

  • 2014 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN 2014) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation. The conference will provide an exceptional platform to the researchers to meet and discuss the utmost solutions, scientific results and methods in solving intriguing problems with people that actively involved in these evergreen fields. T

  • 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN)

    Topics

  • 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN)

    The lnternational Conference CICN 2012 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary to brainstorm for fruitful results and applications.

  • 2011 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2011) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.

  • 2010 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2010) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.


More Conferences

Periodicals related to Enterprise Security

Back to Top

Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


More Periodicals

Most published Xplore authors for Enterprise Security

Back to Top

Xplore Articles related to Enterprise Security

Back to Top

Enterprise Security for Web 2.0

Computer, 2007

Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It's also an outside-in ...


An Organization-Driven Approach for Enterprise Security Development and Management

2011 Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Enterprises security is a complex problem. Pure technology-driven development methods are not sufficient to solve a broad range of enterprise security issues. This paper analyzes the complexity of enterprise security and proposes an organization-driven approach for the problem. The approach combines a set of Unified Modeling Language-based approaches to bridge the gap between enterprise security architecture models and security application ...


A Study of ESMTC(Enterprise Security Management System Based on Threshold Classification)

2012 International Conference on Information Science and Applications, 2012

Most of organizations operate an Enterprise Security Management system (ESM) for managing and analyzing security events. However, it is difficult to instantly analyze and respond for each event by a security manager because the amount of security events collected, stored, analyzed, and displayed by the Enterprise Security Management system is significantly increased according to time and expansions in systems and ...


An enterprise security search system based on multilevel sharing-group access control

2010 2nd IEEE International Conference on Information Management and Engineering, 2010

With the development of internet and the build of enterprise information, enterprise information resources are integrated and enterprise search engines are built. They have been become a hot topic of enterprise information. LogicSQL is a high-level security database system, and it is independently developed. The development of enterprise internal search system is based on LogicSQL security database. We must utilize ...


A roadmap to develop enterprise security architecture

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009

Generally speaking, there is no single solution for security architecture in each enterprise; however, there are common elements of security architecture that enterprises should consider when developing their security plan. Security services provide confidentiality, integrity, and availability services for the platform. This paper describes a way to map these security services into overall enterprise security architecture. We demonstrate a framework ...


More Xplore Articles

Educational Resources on Enterprise Security

Back to Top

IEEE-USA E-Books

  • Enterprise Security for Web 2.0

    Web 2.0 is among the most talked-about, highest-buzz IT constructs of late, the subject of numerous articles and blogs and, since 2004, multiple conferences. While in many respects an Internet phenomenon, Web 2.0 is quickly gaining a beachhead against the legacy "stovepiped" way in which users manage and disseminate information of all kinds within the enterprise. It's also an outside-in revolution: Technologies developed and explored outside the enterprise are migrating inside it. People who've gotten hooked on Web 2.0 demand the same user experience, tools, and networking in their work that they've experienced at play. The good news for enterprise security practitioners is that the impact of Web 2.0 has thus far been evolutionary. However, Web 2.0 growth is accelerating, and it's doing so for reasons as varied as compliance, privacy, and protection of corporate assets. Organizations considering deployment of Web 2.0 capabilities must exercise caution and control, just as they do with non-Web 2.0 technologies. What's needed, in short, is Security 2.0.

  • An Organization-Driven Approach for Enterprise Security Development and Management

    Enterprises security is a complex problem. Pure technology-driven development methods are not sufficient to solve a broad range of enterprise security issues. This paper analyzes the complexity of enterprise security and proposes an organization-driven approach for the problem. The approach combines a set of Unified Modeling Language-based approaches to bridge the gap between enterprise security architecture models and security application development models. It allows an enterprise to coordinate security resources from an enterprise point of view, and develop security applications systematically and efficiently. A comprehensive case study is conducted to illustrate the approach. The study shows through the refinement of enterprise security goals, both software goals and software requirements for a security application can be obtained. In particular, a security application is built to support the specification and automated verification of separation of duty access policies using the Object Constraint Language and formal method Alloy.

  • A Study of ESMTC(Enterprise Security Management System Based on Threshold Classification)

    Most of organizations operate an Enterprise Security Management system (ESM) for managing and analyzing security events. However, it is difficult to instantly analyze and respond for each event by a security manager because the amount of security events collected, stored, analyzed, and displayed by the Enterprise Security Management system is significantly increased according to time and expansions in systems and networks. In addition, as the trends of threats have been changed as a type of Advanced Persistent Threat (APT) that attacks specific individuals and organizations for a long term period, an integrated analysis is required for all security events. Thus, in this study, an Enterprise Security Management system based on Threshold Classification (ESMTC) is proposed to detect and intercept cyber threats occurred for a long term period. It shows an advantage that it does not failure to notice even a single attack through structuralizing and listing detailed attack detection packets and performs related analyses to other attacks.

  • An enterprise security search system based on multilevel sharing-group access control

    With the development of internet and the build of enterprise information, enterprise information resources are integrated and enterprise search engines are built. They have been become a hot topic of enterprise information. LogicSQL is a high-level security database system, and it is independently developed. The development of enterprise internal search system is based on LogicSQL security database. We must utilize the information such as employees, customers and partners' knowledge and experience, but the security of the information should be controlled. Multilevel sharing-group access control is a good way to build a security system, and a complex problem will be divided into a number of small problems. Multilevel relationships between sharing- group have the function of the BLP model's "write-up and read-down" security policy. Information integrity control function such as the BIBA model is achieved by zoning sharing-group. When the users search the same content, they can have different search results in the enterprise security system. Enterprise information is made use of, and the security of the information is completed in the enterprise security search system.

  • A roadmap to develop enterprise security architecture

    Generally speaking, there is no single solution for security architecture in each enterprise; however, there are common elements of security architecture that enterprises should consider when developing their security plan. Security services provide confidentiality, integrity, and availability services for the platform. This paper describes a way to map these security services into overall enterprise security architecture. We demonstrate a framework for understanding disparate design and process considerations; to organize architecture and actions toward improving enterprise security. The security architecture roadmap depicts an approach to map the enterprise's goals to a logical view for security, which is set of security policy and standards, security architecture, and risk management domains. The decisions in the logical layer drive the security processes through design time to run time.

  • ESRML: a markup language for enterprise security requirement specification

    Every enterprise needs to monitor its computing system for possible unauthorized intrusion and other attacks and these activities should be part of its daily routine to safeguard enterprise information system. The ISO 17799 best practices for information security management specifically addresses these issues and provides detailed guidelines on how a secure management framework should be implemented. To capture the security requirements of an organization properly, a customized information security specification language is needed. This paper presents an XML based structured language ESRML (enterprise security requirement markup language) for specifying enterprise information security requirement conforming the ISO 17799 standard.

  • A utility program for enterprise security response

    This presentation on a utility program for enterprise security response is part of a panel session titled 'Critical Infrastructure Protection Initiatives for Electric Power'. This presentation provides an example of how an electric utility can set up a program for security response, while still recognizing the change that the industry is going through.

  • WETICE 2003 Eight Enterprise Security (ES) workshop report

    The WETICE Enterprise Security (ES) workshop had a total of seventeen full papers and one poster paper presented. The workshop presentation fell into four major sections: Trust Management - five papers, Role based access control - five papers, Cryptography - three papers, and Software and Network Security - five papers. Based from the papers' discussions and the large amount of focus on Trust, Risk and RBAC, this problem should continue to be focused on and addressed at the next ES workshop.

  • Development of Enterprise Security Framework in SKK Migas Based on Integration of ISO 27000 and SABSA Model

    This paper presents the development of Enterprise Security Framework (ESF) for an Indonesian government institution called SKK Migas (Special Task Force for Upstream Oil and Gas Business Activities). The framework developed based on two security standard namely ISO 27000 and SABSA. The development is started by evaluating available information security standard and best practice used in enterprise scale. The next step is analyzing existing security policy and implementation regarding the Information Security Management System (ISMS) in SKK Migas and then perform gap analysis. The main step is the synthesis of security framework which intended to improve information security management in SKK Migas. The resulted security framework covers 14 security domains which will be used to control information security management within the institution.

  • Enterprise security and privacy: Why adding IoT and big data makes it so much more difficult

    Achieving enterprise security is a huge challenge, which becomes much more challenging when cloud is added to the mix, due to the multi-tenancy nature of cloud ecosystems. Once we add the dimensions of the Internet of Things (IoT) and Big Data, this problem becomes exponentially more complex. We consider why this is so and highlight a number of key research questions which have yet to be resolved. We seek to address the problem by combining a number of emerging research techniques which we and our collaborators have developed, in such a way as to improve the chance of achieving a better level of security and privacy for enterprises.



Standards related to Enterprise Security

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


Standard for a Protection Profile in Operational Environment B

Standard for a Protection Profile for Hardcopy Devices in a commercial information processing environment in which a moderate level of document security, network security, and security assurance, are required. Typically, the day-to-day proprietary and non-proprietary information needed to operate an enterprise will be handled by this environment. This environment will be known as Operational Environment B.""


Standard for Information System Security Assurance Architecture (ISSAA)

This standard specifies the architecture of a systematic approach for managing the health/state of the security controls of information systems, including the cost-effective selection, documentation, implementation, and ongoing assessment of security controls, and for making and maintaining system security accreditation decisions. The general schema and description of related components are provided.