Conferences related to Computer hacking

Back to Top

2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2019 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2020 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


IEEE INFOCOM 2019 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative research contributions to the field of computer and data communication networks. We invite submissions on a wide range of research topics, spanning both theoretical and systems research.


2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)

IWCMC 2018 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing.


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


More Conferences

Periodicals related to Computer hacking

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals

Most published Xplore authors for Computer hacking

Back to Top

Xplore Articles related to Computer hacking

Back to Top

Ethical Hacking: System Hacking

Ethical Hacking: System Hacking, 01/05/2017

System hacking is the method that hackers use to gain access to computers on a network. Ethical hackers can use these techniques to learn system hacking skills in order to counter, detect, and prevent these types of attacks. This course will cover the process of gaining access to a targeted system. Techniques covered include password cracking, privilege escalation and malware ...


4 INCLUSIVE DESIGNERS

Mismatch: How Inclusion Shapes Design, None

John R. Porter's bedroom would make any die-hard gamer feel right at home. Among the personal computers, beyond the Run Lola Run movie poster, across from a MakerBot busily extruding plastic threads into an unidentifiable widget, is a large black pegboard. The kind of board my grandfather used for hanging hammers and wrenches in his garage.


Reducing the impact of repackaged app on Android

2014 International Conference on Information and Communication Technology Convergence (ICTC), 2014

Repackaging is the one of the most common techniques used by Android malwares. Recently, as one approach to prevent the repackaged malwares, it is considered to use the trust agency that guarantees the app developer. However, these approaches have no or limited secure channel to deploy the guaranteed apps. No secure channel poses another security issue of phishing. The limited ...


Open source software adoption: a status report

IEEE Software, 2001

Using the right software is increasingly critical to project success, but the choices keep getting wider and more confusing. Open source software (OSS) has entered the mix, leaving the traditional confines of the hacker community and entering large-scale, well-publicized applications. However, although some argue that it is ready for wide-scale commercial adaptation and deployment, the myriad number of OSS packages ...


An optimal neural network speed estimator using genetic algorithms

Proceedings of the 4th World Congress on Intelligent Control and Automation (Cat. No.02EX527), 2002

In direct torque control system, a speed-estimating method based on an optimal neural network using genetic algorithms is presented to estimate the rotor speed of asynchronous motors. According to the equations of asynchronous motors, the equation of speed is gotten, a speed estimator model based on recursive neural networks is also gotten, and genetic algorithms optimize the speed estimator. The ...


More Xplore Articles

Educational Resources on Computer hacking

Back to Top

IEEE-USA E-Books

  • Ethical Hacking: System Hacking

    System hacking is the method that hackers use to gain access to computers on a network. Ethical hackers can use these techniques to learn system hacking skills in order to counter, detect, and prevent these types of attacks. This course will cover the process of gaining access to a targeted system. Techniques covered include password cracking, privilege escalation and malware detection.

  • 4 INCLUSIVE DESIGNERS

    John R. Porter's bedroom would make any die-hard gamer feel right at home. Among the personal computers, beyond the Run Lola Run movie poster, across from a MakerBot busily extruding plastic threads into an unidentifiable widget, is a large black pegboard. The kind of board my grandfather used for hanging hammers and wrenches in his garage.

  • Reducing the impact of repackaged app on Android

    Repackaging is the one of the most common techniques used by Android malwares. Recently, as one approach to prevent the repackaged malwares, it is considered to use the trust agency that guarantees the app developer. However, these approaches have no or limited secure channel to deploy the guaranteed apps. No secure channel poses another security issue of phishing. The limited channel through trust market poses the limitation in app operation. To tackle these problems, we present a secure trusted app deployment approach. Our approach inserts the guarantee generated by trust agency into app. The app with this guarantee, called Trusted APP, is signed with only developer certificate. So Trusted APP can be deployed through the existing Android Markets and has no limitation in app operation. For secure deployment, the guarantee information in the app is verified on the device before the installation. Through this verification, the proposed approach can reduce to propagate the repackaged malwares of Trusted APPs.

  • Open source software adoption: a status report

    Using the right software is increasingly critical to project success, but the choices keep getting wider and more confusing. Open source software (OSS) has entered the mix, leaving the traditional confines of the hacker community and entering large-scale, well-publicized applications. However, although some argue that it is ready for wide-scale commercial adaptation and deployment, the myriad number of OSS packages make actual adoption a real challenge. This article presents a straightforward and practical roadmap to navigate your OSS adoption considerations. We do not have a universally accepted definition of OSS. For instance, Netscape, Sun Microsystems, and Apple recently introduced what they call "community-source" versions of their popular software-the Mozilla project, Solaris, and MacOS X, respectively. Such efforts, while validating the OSS concept, also make their inclusion into the OSS community a potential topic for contention. We use the loose definition of OSS that includes publicly available source code and community-source software.

  • An optimal neural network speed estimator using genetic algorithms

    In direct torque control system, a speed-estimating method based on an optimal neural network using genetic algorithms is presented to estimate the rotor speed of asynchronous motors. According to the equations of asynchronous motors, the equation of speed is gotten, a speed estimator model based on recursive neural networks is also gotten, and genetic algorithms optimize the speed estimator. The simulation result shows the optimized speed estimator can track accurately the variation of speed, and the system has better dynamic performance.

  • A comprehensive online tool [WR-3] that detects security flaws in networks

    As networks became an integral part of everyone's lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to secure the privacy of a networks but only big organizations are utilizing these technologies with their full potential as their implementation require costly resources. Here we have a comprehensive solution for network administrators who intend to maintain their networks private from others and want to conserve any confidential data. Our solution is based on a very simple practice that “Network administrators should try hacking their networks themselves before bad guys do”. Many big organizations implements this practice by recruiting ethical hackers to analyze their networks but other organizations including government organizations of developing and under developed countries are still unable to preserve their network privacy. As a solution we have developed an online application which can be globally accessed and provides a very simple and easy to use interface for network administrators to use almost all popular exploits and network intrusion tools on their own networks and detect any possible network breach.

  • More evidence that SRHD-SGI produces hard SAT instances

    In this paper we test whether the properties of the SAT encoded SRHD-SGI instances are independent of the encoding scheme. We selected for our experiments several SAT solvers that won medals at the last SAT competition and a solver that performed very well on the direct encoded SRHD-SGI instances used in the competition. We tested four encoding of SGI to SAT based on converting the original SGI instance into a PBC instance and then from PBC to SAT. We found that the most important properties of SAT encoded SRHD-SGI are preserved under all encodings and, therefore, we concluded that these properties are independent of the encoding scheme1.

  • A 1.2V, 200 µ W rail-to-rail Op Amp with 90dB THD using replica gain enhancement

    This paper presents an architecture for a high-swing 1.2 V low-power fully differential class-AB amplifier with a DC-gain of 52 dB. A low-voltage differential input stage is applied as the basic architecture. The replica gain enhancement technique is used to increase the DC-gain by 20 dB without degrading the output swing. Furthermore, this gain enhancement concept does not increase the minimal supply voltage and also allows scaling of the replica amplifier. The power dissipation is 200 µW providing a gainbandwidth (GBW) of 1.9 MHz at a capacitive load of 30 pF and a THD of 90 dB.

  • IBM works on a universal virtual computer

    None

  • A two-year survey on security challenges in automotive threat landscape

    The threat landscape is changing and the connected-car now becomes a new cyber attack target. When mobile connects both car and the vehicle cloud via mobile apps, connected-car solutions are bringing new threats into the vehicle. As early as late 2013, we began to find security vulnerabilities for car makers, TSP (Telematics Service Providers), car sharing companies, OBD dongle manufacturers and auto app developers in their products and services. With our helps, those vendors have fixed security vulnerabilities. In our knowledge, it is first comprehensive connected-car security survey covering both premarket and aftermarket. More than 80 testing checkpoints have been applied on the security penetration testing. In this paper, we will show our research findings.



Standards related to Computer hacking

Back to Top

No standards are currently tagged "Computer hacking"


Jobs related to Computer hacking

Back to Top