Conferences related to Communication system security

Back to Top

2020 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI)

This symposium pertains to the field of electromagnetic compatibility.


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


More Conferences

Periodicals related to Communication system security

Back to Top

Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


More Periodicals

Most published Xplore authors for Communication system security

Back to Top

Xplore Articles related to Communication system security

Back to Top

Contents

The IEE Seminar on Security of Distributed Control Systems, 2005., 2005

None


Multiagent And WAN Based Adaptive Coordinated Protection System

2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific, 2005

This paper presents a multi-agent and WAN based adaptive coordinated protection system (MAWBACPS). The system utilizes IP intranet to realize real- time wide area information exchange of a power system. Multi-agent system's several good qualities to solve distributing problems are used to realize the coordination of the operation settings of protective relays. A new idea of effortful adaptation for power ...


Remote Controller For Cebus Home System

IEEE 1993 International Conference on Consumer Electronics Digest of Technical Papers, 1993

None


Electronic security technology roadmap [for electric utilities]

2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194), 2001

Secure communication of business information is essential to all power and energy industry operations. Modern networking technologies such as the Internet offer new tools for making the communication and sharing of information more efficient and faster than ever before, but networking can significantly increase exposure to information security risks.


Implementing back-up control centers [for power systems]

IEEE Power Engineering Society Summer Meeting,, 2002

Summary form only given, as follows. The original power system control center backup plan was to have redundant systems to avoid hardware problems. In today's environment, it is necessary to have back-up systems that provide security and functionality that go well beyond the basic redundant system. In addition to regulatory pressure for back up control centers, there is also the ...


More Xplore Articles

Educational Resources on Communication system security

Back to Top

IEEE.tv Videos

Optical Stealth Communication based on Amplified Spontaneous Emission Noise - Ben Wu - IEEE Sarnoff Symposium, 2019
Reconfigurable Distributed MIMO for Physical-layer Security - Zygmunt Haas - IEEE Sarnoff Symposium, 2019
5G and Beyond: International Network Generations Roadmap (INGR) - IEEE Future Networks webinar
Micro-Apps 2013: Precision RF/MW Cable and Antenna Test in the Field
Tutorial 2: 5G Security & Privacy - NetSoft 2020 Conference
Ciena Corp - IEEE Spectrum Emerging Technology Award, 2019 IEEE Honors Ceremony
Be Prepared for the Test Challenges of IoT - MicroApps 2015 Keysight Technologies
Bill Woodward presents NEEDLES: 2016 End to End Trust and Security Workshop for the Internet of Things
IMS 2011 Microapps - Remcom's XFdtd and Wireless InSite: Advanced Tools for Advanced Communication Systems Analysis
Laser Communication From Space Using Superconducting Detectors - ASC-2014 Plenary series - 12 of 13 - Friday 2014/8/15
Lizhong Zheng's Globecom 2019 Keynote
Q-Band CMOS Transmitter System-on-Chip - Tim Larocca - RFIC Showcase 2018
WIRELESS TRANSCEIVER SYSTEM DESIGN FOR MODERN COMMUNICATION STANDARDS
Keynote: Greg Austin - ETAP Beijing 2016
Ulf Lindqvist presents the IEEE Cybersecurity Initiative (CybSI): 2016 End to End Trust and Security Workshop for the Internet of Things
Developing Automated Analysis Tools for Space/Time Sidechannel Detection - IEEE SecDev 2016
Computing Paradigms: The Largest Cognitive Systems Will Be Optoelectronic - Jeff Shainline - ICRC 2018
Howard Shrobe: Runtime Security Monitor for Real-time Critical System Embedded Applications: WF IoT 2016
Implementation of a Framework to Support Cybersecurity and Internet Governance in Cameroon: Njei Check - ETAP Forum Namibia, Africa 2017
Keynote Deepak Maheshwari - India Biometrics - ETAP Forum Tel Aviv 2016

IEEE-USA E-Books

  • Contents

    None

  • Multiagent And WAN Based Adaptive Coordinated Protection System

    This paper presents a multi-agent and WAN based adaptive coordinated protection system (MAWBACPS). The system utilizes IP intranet to realize real- time wide area information exchange of a power system. Multi-agent system's several good qualities to solve distributing problems are used to realize the coordination of the operation settings of protective relays. A new idea of effortful adaptation for power system protection is proposed, and a new method to determine adaptive coordinated relay settings of lines are proposed in this paper. Moreover, the structure, communication mechanism and coordination control strategy of MAWBACPS, and relating agents' design are presented. Experiment results illustrate that MAWBACPS can realize the coordination of protections, enable the back-up relays to use their adaptive settings in most situations, and efficiently improve the security of power system

  • Remote Controller For Cebus Home System

    None

  • Electronic security technology roadmap [for electric utilities]

    Secure communication of business information is essential to all power and energy industry operations. Modern networking technologies such as the Internet offer new tools for making the communication and sharing of information more efficient and faster than ever before, but networking can significantly increase exposure to information security risks.

  • Implementing back-up control centers [for power systems]

    Summary form only given, as follows. The original power system control center backup plan was to have redundant systems to avoid hardware problems. In today's environment, it is necessary to have back-up systems that provide security and functionality that go well beyond the basic redundant system. In addition to regulatory pressure for back up control centers, there is also the internal need to improve security and reduce operating costs. This presentation describes what companies are doing to provide back-up control systems to address a multitude of requirements such as network and equipment security, multiple time zones, data integration, communication issues and system support.

  • Study on facility system control of integrated traffic terminal with public security as priority

    Projects of integrated traffic terminals involve a great number of equipment systems, including ventilation, lighting, communication, power supply and electric supervision, water supply and drainage as well as fire fighting and integral supervision. The safe operation of these equipment and systems is an important control point for integrated terminals at operation phases. Therefore the study on operation and management modes becomes the key to ensure that an integrated traffic terminal runs in a safe and reliable manner. With illustration of the composition of systematic functions of facilities and with introduction of life cycle theory, the paper demonstrates the way for realizing the facility integrated control system.

  • A controller agent model to counteract DoS attacks in multiple domains

    In this paper we discuss techniques to prevent distributed denial of service (DDoS) attacks within the ISP domain and extend the scheme to prevent the attack in multiple ISP domains. With a new packet marking technique and agent design, our model is able to identify the approximate source of attack with a single packet and has many features to minimise DDoS attacks.

  • Critical communications issues for distributed command land control

    The author identifies critical issues in meeting the communications requirements for distributed command and control and highlights the impact of failing to adequately satisfy this requirement. The seven critical issues presented in prioritized order of importance are detectability, availability, data rate, security, impact on mobility, skill for operation, and network management. The basic precept of distributed command and control is to enhance the survival of the command and control system.<<ETX>>

  • Instant messaging puts on a business suit

    Despite the many users, the three big consumer instant messaging (IM) companies don't make money directly from instant messaging because the service is free. They have thus been looking for a way to sell enhanced IM services to companies. Businesses want more from IM than they get from the consumer versions they've been using. For example, consumer systems typically don't offer security, message archiving, auditing, or ways to control user access.

  • A security framework for wireless network based on public key infrastructure

    This paper proposed a security framework for wireless network based on Public Key Infrastructure (PKI) which aims to answer these questions that how to solve the security problem in wireless network between the client operation and service operation. It illustrates the model by presenting a modified security framework for a variety of applications than traditional PKI framework. Our aim is to show the new security framework in wireless network that the traditional wireless network does not have.



Standards related to Communication system security

Back to Top

Physical (PHY) and Medium Access Control (MAC) Layer Standard for Short-Range Wireless Optical Communication Using Visible Light

This standard defines a PHY and MAC layer for short-range optical wireless communications using visible light in optically transparent media. The visible light spectrum extends from 380 to 780 nm in wavelength. The standard is capable of delivering data rates sufficient to support audio and video multimedia services and also considers mobility of the visible link, compatibility with visible-light infrastructures, ...


Systems and software engineering -- Software life cycle processes

This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...



Jobs related to Communication system security

Back to Top