Conferences related to Computer hacking

Back to Top

2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D)

Bi-Annual IEEE PES T&D conference. Largest T&D conference in North America.


2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2019 IEEE 20th International Conference on Information Reuse and Integration for Data Science (IRI)

This conference presents excellent, novel, and contemporary papers covering all aspects of Data ? including Scientific Theory and Technology-Based Applications. New data analytic algorithms, technologies, and tools are sought to be able to manage, integrate, and utilize large amounts of data despite hardware, software, and/or bandwidth constraints; to construct models yielding important data insights; and, to create visualizations to aid in presenting and understanding the data. System development and integration needs to also adapt to these new algorithms, technologies, tools, and needs. This conference and its constituents support the development of technologies and applications for peaceful purposes to improve the human condition.


2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)

Electrical Engineering, Academic and Industrial


2019 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues in these fields.


More Conferences

Periodicals related to Computer hacking

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals

Most published Xplore authors for Computer hacking

Back to Top

Xplore Articles related to Computer hacking

Back to Top

Ethical Hacking: System Hacking

Ethical Hacking: System Hacking, 01/05/2017

System hacking is the method that hackers use to gain access to computers on a network. Ethical hackers can use these techniques to learn system hacking skills in order to counter, detect, and prevent these types of attacks. This course will cover the process of gaining access to a targeted system. Techniques covered include password cracking, privilege escalation and malware ...


4 INCLUSIVE DESIGNERS

Mismatch: How Inclusion Shapes Design, None

John R. Porter's bedroom would make any die-hard gamer feel right at home. Among the personal computers, beyond the Run Lola Run movie poster, across from a MakerBot busily extruding plastic threads into an unidentifiable widget, is a large black pegboard. The kind of board my grandfather used for hanging hammers and wrenches in his garage.


Reducing the impact of repackaged app on Android

2014 International Conference on Information and Communication Technology Convergence (ICTC), 2014

Repackaging is the one of the most common techniques used by Android malwares. Recently, as one approach to prevent the repackaged malwares, it is considered to use the trust agency that guarantees the app developer. However, these approaches have no or limited secure channel to deploy the guaranteed apps. No secure channel poses another security issue of phishing. The limited ...


Open source software adoption: a status report

IEEE Software, 2001

Using the right software is increasingly critical to project success, but the choices keep getting wider and more confusing. Open source software (OSS) has entered the mix, leaving the traditional confines of the hacker community and entering large-scale, well-publicized applications. However, although some argue that it is ready for wide-scale commercial adaptation and deployment, the myriad number of OSS packages ...


An optimal neural network speed estimator using genetic algorithms

Proceedings of the 4th World Congress on Intelligent Control and Automation (Cat. No.02EX527), 2002

In direct torque control system, a speed-estimating method based on an optimal neural network using genetic algorithms is presented to estimate the rotor speed of asynchronous motors. According to the equations of asynchronous motors, the equation of speed is gotten, a speed estimator model based on recursive neural networks is also gotten, and genetic algorithms optimize the speed estimator. The ...


More Xplore Articles

Educational Resources on Computer hacking

Back to Top

IEEE-USA E-Books

  • Ethical Hacking: System Hacking

    System hacking is the method that hackers use to gain access to computers on a network. Ethical hackers can use these techniques to learn system hacking skills in order to counter, detect, and prevent these types of attacks. This course will cover the process of gaining access to a targeted system. Techniques covered include password cracking, privilege escalation and malware detection.

  • 4 INCLUSIVE DESIGNERS

    John R. Porter's bedroom would make any die-hard gamer feel right at home. Among the personal computers, beyond the Run Lola Run movie poster, across from a MakerBot busily extruding plastic threads into an unidentifiable widget, is a large black pegboard. The kind of board my grandfather used for hanging hammers and wrenches in his garage.

  • Reducing the impact of repackaged app on Android

    Repackaging is the one of the most common techniques used by Android malwares. Recently, as one approach to prevent the repackaged malwares, it is considered to use the trust agency that guarantees the app developer. However, these approaches have no or limited secure channel to deploy the guaranteed apps. No secure channel poses another security issue of phishing. The limited channel through trust market poses the limitation in app operation. To tackle these problems, we present a secure trusted app deployment approach. Our approach inserts the guarantee generated by trust agency into app. The app with this guarantee, called Trusted APP, is signed with only developer certificate. So Trusted APP can be deployed through the existing Android Markets and has no limitation in app operation. For secure deployment, the guarantee information in the app is verified on the device before the installation. Through this verification, the proposed approach can reduce to propagate the repackaged malwares of Trusted APPs.

  • Open source software adoption: a status report

    Using the right software is increasingly critical to project success, but the choices keep getting wider and more confusing. Open source software (OSS) has entered the mix, leaving the traditional confines of the hacker community and entering large-scale, well-publicized applications. However, although some argue that it is ready for wide-scale commercial adaptation and deployment, the myriad number of OSS packages make actual adoption a real challenge. This article presents a straightforward and practical roadmap to navigate your OSS adoption considerations. We do not have a universally accepted definition of OSS. For instance, Netscape, Sun Microsystems, and Apple recently introduced what they call "community-source" versions of their popular software-the Mozilla project, Solaris, and MacOS X, respectively. Such efforts, while validating the OSS concept, also make their inclusion into the OSS community a potential topic for contention. We use the loose definition of OSS that includes publicly available source code and community-source software.

  • An optimal neural network speed estimator using genetic algorithms

    In direct torque control system, a speed-estimating method based on an optimal neural network using genetic algorithms is presented to estimate the rotor speed of asynchronous motors. According to the equations of asynchronous motors, the equation of speed is gotten, a speed estimator model based on recursive neural networks is also gotten, and genetic algorithms optimize the speed estimator. The simulation result shows the optimized speed estimator can track accurately the variation of speed, and the system has better dynamic performance.

  • A comprehensive online tool [WR-3] that detects security flaws in networks

    As networks became an integral part of everyone's lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to secure the privacy of a networks but only big organizations are utilizing these technologies with their full potential as their implementation require costly resources. Here we have a comprehensive solution for network administrators who intend to maintain their networks private from others and want to conserve any confidential data. Our solution is based on a very simple practice that “Network administrators should try hacking their networks themselves before bad guys do”. Many big organizations implements this practice by recruiting ethical hackers to analyze their networks but other organizations including government organizations of developing and under developed countries are still unable to preserve their network privacy. As a solution we have developed an online application which can be globally accessed and provides a very simple and easy to use interface for network administrators to use almost all popular exploits and network intrusion tools on their own networks and detect any possible network breach.

  • More evidence that SRHD-SGI produces hard SAT instances

    In this paper we test whether the properties of the SAT encoded SRHD-SGI instances are independent of the encoding scheme. We selected for our experiments several SAT solvers that won medals at the last SAT competition and a solver that performed very well on the direct encoded SRHD-SGI instances used in the competition. We tested four encoding of SGI to SAT based on converting the original SGI instance into a PBC instance and then from PBC to SAT. We found that the most important properties of SAT encoded SRHD-SGI are preserved under all encodings and, therefore, we concluded that these properties are independent of the encoding scheme1.

  • A 1.2V, 200 µ W rail-to-rail Op Amp with 90dB THD using replica gain enhancement

    This paper presents an architecture for a high-swing 1.2 V low-power fully differential class-AB amplifier with a DC-gain of 52 dB. A low-voltage differential input stage is applied as the basic architecture. The replica gain enhancement technique is used to increase the DC-gain by 20 dB without degrading the output swing. Furthermore, this gain enhancement concept does not increase the minimal supply voltage and also allows scaling of the replica amplifier. The power dissipation is 200 µW providing a gainbandwidth (GBW) of 1.9 MHz at a capacitive load of 30 pF and a THD of 90 dB.

  • IBM works on a universal virtual computer

    None

  • A two-year survey on security challenges in automotive threat landscape

    The threat landscape is changing and the connected-car now becomes a new cyber attack target. When mobile connects both car and the vehicle cloud via mobile apps, connected-car solutions are bringing new threats into the vehicle. As early as late 2013, we began to find security vulnerabilities for car makers, TSP (Telematics Service Providers), car sharing companies, OBD dongle manufacturers and auto app developers in their products and services. With our helps, those vendors have fixed security vulnerabilities. In our knowledge, it is first comprehensive connected-car security survey covering both premarket and aftermarket. More than 80 testing checkpoints have been applied on the security penetration testing. In this paper, we will show our research findings.



Standards related to Computer hacking

Back to Top

No standards are currently tagged "Computer hacking"


Jobs related to Computer hacking

Back to Top