Computer crime

View this topic in
Computer crime, or cybercrime, refers to any crime that involves a computer and a network. (Wikipedia.org)






Conferences related to Computer crime

Back to Top

2020 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.

  • 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premier annual computer vision event comprising the main conference and severalco-located workshops and short courses. With its high quality and low cost, it provides anexceptional value for students, academics and industry researchers.

  • 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.

  • 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conferenceand 27co-located workshops and short courses. With its high quality and low cost, it provides anexceptional value for students,academics and industry.

  • 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry.

  • 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    computer, vision, pattern, cvpr, machine, learning

  • 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. Main conference plus 50 workshop only attendees and approximately 50 exhibitors and volunteers.

  • 2013 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    CVPR is the premiere annual Computer Vision event comprising the main CVPR conference and 27 co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry.

  • 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Topics of interest include all aspects of computer vision and pattern recognition including motion and tracking,stereo, object recognition, object detection, color detection plus many more

  • 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Sensors Early and Biologically-Biologically-inspired Vision, Color and Texture, Segmentation and Grouping, Computational Photography and Video

  • 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Concerned with all aspects of computer vision and pattern recognition. Issues of interest include pattern, analysis, image, and video libraries, vision and graphics, motion analysis and physics-based vision.

  • 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

    Concerned with all aspects of computer vision and pattern recognition. Issues of interest include pattern, analysis, image, and video libraries, vision and graphics,motion analysis and physics-based vision.

  • 2008 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2007 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2006 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)

  • 2005 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


IEEE INFOCOM 2020 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.


2019 IEEE 16th International Conference on Networking, Sensing and Control (ICNSC)

The conference focuses on networking, sensing and control three areas, but also opens to some emerging subjects in information technology, such as data science and machine learning.


2019 IEEE International Conference on Electro Information Technology (EIT)

Robotics and MechatronicsGPU ComputingIntelligent Systems and Multi-agent SystemsControl Systems and System IdentificationReconfigurable and Embedded SystemsPower Systems and Power ElectronicsSolid State, Consumer and Automotive ElectronicsADAS-Advanced Driver Assist SystemsConnected Vehicle - V2V, V2I, V2XBiomedical Applications, TelemedicineBiometrics and BioinformaticsNanotech, Micro Electromechanical SystemsWireless communication, Sensor NetworksCyber SecurityComputer Vision, Signal/Image and ProcessingDistributed Data Fusion and Data MiningCloud, Mobile, and Distributed ComputingSoftware Engineering, Middleware ArchitectureEngineering Education


More Conferences

Periodicals related to Computer crime

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


Distributed Systems Online, IEEE

After nine years of publication, DS Online will be moving into a new phase as part of Computing Now (http://computingnow.computer.org), a new website providing the front end to all of the Computer Society's magazines. As such, DS Online will no longer be publishing standalone peer-reviewed articles.


More Periodicals

Most published Xplore authors for Computer crime

Back to Top

Xplore Articles related to Computer crime

Back to Top

Attention to Context

Computer, 2013

In striving to build a secure information infrastructure, we're all trying to develop patterns of local behavior. The Web extra at http://youtu.be/lXk2QrOxEzI is a video segment in which author David Alan Grier expands on his Errant Hashtag column, in which he discusses how security policies provide guiding hands to help ensure cybersecurity.


IEEE Draft Standard for Intelligent Electronic Devices (IEDs) Cyber Security Capabilities

IEEE P1686/D14, April 2013, 2013

This standard defines the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs. The standard addresses security regarding the access, operation, configuration, firmware revision and data retrieval from an IED. It does not address communications for the purpose of power system protection (teleprotection).


I Lessons from Financially Motivated Cybercrimes

You'll see this message when it is too late: The Legal and Economic Aftermath of Cybersecurity Breaches, None

None


Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence

IEEE Systems Journal, 2017

The papers in this special issue focus on insider threats to information security, counter-intelligence, digital espionage, cyber-security, and cryptography.


IEEE Spectrum - Front cover

IEEE Spectrum, 2017

Presents the front cover for this issue of the publication.


More Xplore Articles

Educational Resources on Computer crime

Back to Top

IEEE-USA E-Books

  • Attention to Context

    In striving to build a secure information infrastructure, we're all trying to develop patterns of local behavior. The Web extra at http://youtu.be/lXk2QrOxEzI is a video segment in which author David Alan Grier expands on his Errant Hashtag column, in which he discusses how security policies provide guiding hands to help ensure cybersecurity.

  • IEEE Draft Standard for Intelligent Electronic Devices (IEDs) Cyber Security Capabilities

    This standard defines the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs. The standard addresses security regarding the access, operation, configuration, firmware revision and data retrieval from an IED. It does not address communications for the purpose of power system protection (teleprotection).

  • I Lessons from Financially Motivated Cybercrimes

    None

  • Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence

    The papers in this special issue focus on insider threats to information security, counter-intelligence, digital espionage, cyber-security, and cryptography.

  • IEEE Spectrum - Front cover

    Presents the front cover for this issue of the publication.

  • Ethical Hacking: System Hacking

    System hacking is the method that hackers use to gain access to computers on a network. Ethical hackers can use these techniques to learn system hacking skills in order to counter, detect, and prevent these types of attacks. This course will cover the process of gaining access to a targeted system. Techniques covered include password cracking, privilege escalation and malware detection.

  • Traffic-Aware Patching for Cyber Security in Mobile IoT

    The various types of communication technologies and mobility features in IoT on one hand enable fruitful and attractive applications, but on the other hand facilitate malware propagation, thereby raising new challenges in handling IoT-empowered malware for cyber security. Compared to the malware propagation control scheme in traditional wireless networks, where nodes can be directly repaired and secured, in IoT, compromised end devices are difficult to patch. Alternatively, blocking malware via patching intermediate nodes turns out to be a more feasible and practical solution. Specifically, patching intermediate nodes can effectively prevent the proliferation of malware propagation by securing infrastructure links and limiting malware propagation to local device-to-device dissemination. This article proposes a novel traffic-aware patching scheme to select important intermediate nodes to patch, which applies to the IoT system with limited patching resources and response time constraint. Experiments on real-world trace datasets in IoT networks are conducted to demonstrate the advantage of the proposed traffic-aware patching scheme in alleviating malware propagation.

  • Security and Privacy for a Green Internet of Things

    In the 21st century, the Internet of Things (IoT) will control critical infrastructure such as smart cities and the smart power grid. The author proposes a new approach to achieve exceptional performance, cybersecurity, and privacy in a green Industrial and Tactile IoT, in datacenters, and in big data green cloud computing systems. The combination of a software-defined networking (SDN) control plane, deterministic communications, and lightweight layer-2 encryption offers several benefits. For example, an SDN control plane can embed millions of deterministic virtual networks (DVNs) into layer 2. All congestion, interference, denial-of-service attacks, and cyberattacks targeting a DVN can be removed in layer 2. Unauthorized packets from a cyberattacker can be detected in layer 2 in microseconds. IoT delays can be reduced to the speed-of-light. Finally, exceptional privacy can be achieved using lightweight encryption with long keys. A green Industrial and Tactile IoT can embed millions of DVNs to enable smart cities, and can also pay for itself quickly through reduced capital and energy costs. A field-programmable gate array hardware testbed illustrates the concepts.

  • The Right to Digital Self-Defense

    Although the right to physical self-defense is legally well established, it's unclear how this principle translates to security in today's digital world. Approaches to cyber self-defense are discussed, as are arguments for and against allowing organizations to actively respond to cyberattacks.

  • The DARPA Cyber Grand Challenge: A Competitor's Perspective

    In June 2014, DARPA launched the Cyber Grand Challenge (CGC) to spur innovation in fully automated software vulnerability analysis and repair. The competitors' automated systems evaluated challenges in the CGC Qualifying Event, with the top seven including the University of Idaho's Center for Secure and Dependable Systems team moving on to the fully automated capture- the-flag competition, which will be held in August 2016.



Standards related to Computer crime

Back to Top

No standards are currently tagged "Computer crime"


Jobs related to Computer crime

Back to Top