Computer security

View this topic in
Computer security is a branch of computer technology known as Information Security as applied to computers and networks. (Wikipedia.org)






Conferences related to Computer security

Back to Top

2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

    EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2020 IEEE Frontiers in Education Conference (FIE)

The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues inthese fields.


2020 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)

The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


More Conferences

Periodicals related to Computer security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


More Periodicals

Most published Xplore authors for Computer security

Back to Top

Xplore Articles related to Computer security

Back to Top

Attention to Context

Computer, 2013

In striving to build a secure information infrastructure, we're all trying to develop patterns of local behavior. The Web extra at http://youtu.be/lXk2QrOxEzI is a video segment in which author David Alan Grier expands on his Errant Hashtag column, in which he discusses how security policies provide guiding hands to help ensure cybersecurity.


Table of Contents

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018

The following topics are dealt with: learning (artificial intelligence); security of data; computer crime; cryptography; Internet; Big Data; support vector machines; text analysis; invasive software; Internet of Things.


The quest for intruder-proof computer systems

IEEE Spectrum, 1989

The theft of US military information from Internet the research computer network built around the Defense Advanced Research Projects Agency's ARPAnet for academic use, is cited as an example of the computer break-ins that are focusing attention on computer security. The nature and extent of the threat are explored, and steps to combat it are described. Among them are encryption, ...


Contents

The IEE Seminar on Security of Distributed Control Systems, 2005., 2005

None


What's Special about Cloud Security?

IT Professional, 2012

Although cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it's not clear what security issues are particular to cloud computing. To approach this question, the author attempts to derive cloud security issues from various cloud definitions and a reference architecture.


More Xplore Articles

Educational Resources on Computer security

Back to Top

IEEE.tv Videos

Rebooting Computing: Trust and Security in Future Computing Systems
NIKSUN World Wide Security & Mobility Conference 2011-D Raychaudhuri
Robotics History: Narratives and Networks Oral Histories: Ruzena Bajcsy
Big Data & the Cloud: Privacy and Security issues
IoT Security Best Practices - Webinar by George Corser and Jared Bielby
Maker Faire 2008: Babbage's Difference Engine No. 2 Replica
Panelist Yuval Elovici - ETAP Forum Tel Aviv 2016
Solving Real World Problems with Computing: Exploring Careers in Engineering and Technology
Internet of Things Panelist - Jeffrey Voas: 2016 Technology Time Machine
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Security for SDN/NFV and 5G Networks - Ashutosh Dutta - India Mobile Congress, 2018
Howard Shrobe: Runtime Security Monitor for Real-time Critical System Embedded Applications: WF IoT 2016
Cyber Security Awareness (CSA) in Africa: Basie von Solms - ETAP Forum Namibia, Africa 2017
Cloud Standardization: A View from IEEE Cloud Congress @ GlobeCom 2012
Ignite! Session: Deborah Cooper
Keynote Paul Mockapetris: The Internet: How the Most Useful Tool in the World Became Dangerous: WF-IoT 2016
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
Cloud Ecosystem: A View from the IEEE Cloud Congress @ GlobeCom 2012
Alexandros Fragkiadakis: Trust-based Scheme Employing Evidence Reasoning for IoT Architectures: WF-IoT 2016
"A View from the Cloud" -- IEEE Cloud 2012 Conference

IEEE-USA E-Books

  • Attention to Context

    In striving to build a secure information infrastructure, we're all trying to develop patterns of local behavior. The Web extra at http://youtu.be/lXk2QrOxEzI is a video segment in which author David Alan Grier expands on his Errant Hashtag column, in which he discusses how security policies provide guiding hands to help ensure cybersecurity.

  • Table of Contents

    The following topics are dealt with: learning (artificial intelligence); security of data; computer crime; cryptography; Internet; Big Data; support vector machines; text analysis; invasive software; Internet of Things.

  • The quest for intruder-proof computer systems

    The theft of US military information from Internet the research computer network built around the Defense Advanced Research Projects Agency's ARPAnet for academic use, is cited as an example of the computer break-ins that are focusing attention on computer security. The nature and extent of the threat are explored, and steps to combat it are described. Among them are encryption, smart cards, and fingerprint readers.<<ETX>>

  • Contents

    None

  • What's Special about Cloud Security?

    Although cloud security concerns have consistently ranked as one of the top challenges to cloud adoption, it's not clear what security issues are particular to cloud computing. To approach this question, the author attempts to derive cloud security issues from various cloud definitions and a reference architecture.

  • Open, Object-Based Model as the Basis of an Architecture for Distribution Control Centers

    None

  • Session TP1b: Statistical signal processing for forensics and security

    None

  • IEEE Approved Draft Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

    Cryptographic transform for protection of data in sector-level storage devices is specified in this standard.

  • Milestones in the History of Information and Computer Ethics

    This chapter contains sections titled:IntroductionNorbert Wiener's Foundation of Information EthicsComputer Ethics Developments after Wiener and before ManerWalter Maner's Computer Ethics InitiativeDeborah Johnson's Influential Textbook and the Start of the “Uniqueness Debate”James Moor's Classic Paper and His Influential Computer Ethics TheoryThe Professional‐Ethics Approach of Donald GotterbarnComputing and Human ValuesLuciano Floridi's Information Ethics TheoryConcluding Remarks: The Exponential Growth of Computer EthicsReferences and Selected Resources

  • Ethical Hacking: System Hacking

    System hacking is the method that hackers use to gain access to computers on a network. Ethical hackers can use these techniques to learn system hacking skills in order to counter, detect, and prevent these types of attacks. This course will cover the process of gaining access to a targeted system. Techniques covered include password cracking, privilege escalation and malware detection.



Standards related to Computer security

Back to Top

IEEE Guide for Electric Power Substation Physical and Electronic Security

This Guide identifies and discusses security issues related to human intervention during the construction, operation, (except for natural disasters) and maintenance of electric power supply substations. It also documents methods and designs to mitigate intrusions.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities

The standard defines the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection (CIP) programs. The standard addresses security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED. Encryption for the secure transmission of data both within and external to the substation is not part of this standard ...


Systems and software engineering -- Software life cycle processes

This International Standard establishes a common framework for software life cycle processes, with welldefined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that are to be applied during the acquisition of a software product or service and during the supply, development, operation, maintenance and disposal of software products. Software includes the software portion ...



Jobs related to Computer security

Back to Top