Conferences related to Computer worms

Back to Top

2020 IEEE 23rd International Conference on Information Fusion (FUSION)

The International Conference on Information Fusion is the premier forum for interchange of the latest research in data and information fusion, and its impacts on our society. The conference brings together researchers and practitioners from academia and industry to report on the latest scientific and technical advances.


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2020 IEEE International Conference on Robotics and Automation (ICRA)

The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.


2020 IEEE Radio and Wireless Symposium (RWS)

RWW2020 will be an international conference covering all aspects of radio and wireless. RWW2020's multidisciplinary events will bring together innovations that are happening across the broad wireless spectrum. RWS2020, this conference application, acts as the main conference for the entire RWW of events that includes the following conferences: PAWR2020, SiRF2020, WiSNet2020, and TWiOS2020 (IEEE Topical Conference on RF/microwave Power Amplifiers, IEEE Topical Meeting on Silicon Monolithic Integrated Circuits in RF Systems, IEEE Topical Conference on Wireless Sensors and Sensor Networks, and IEEE Topical Workshop on the Internet of Space IoS, respectively). In addition to traditional podium presentations and poster sessions, tracks for IEEE Distinguished Lectures, Sunday half-day workshops, Monday panels, and a demo session are planned. A RWW2020 plenary talk are a parallel IoT Summit are planned. A student competition is also planned.

  • 2019 IEEE Radio and Wireless Symposium (RWS)

    This is a conference with a focus on wireless components, applications, and systems that impact both our current and future life style. The conference's main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today's design compromises can trigger tomorrow's advanced technologies. Where dreams can become a reality. RWS is the cornerstone conference for Radio Wireless Week.

  • 2018 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today’s design compromises can trigger tomorrow’s advanced technologies. Where dreams can become a reality.

  • 2017 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today’s design compromises can trigger tomorrow’s advanced technologies. Where dreams can become a reality.

  • 2016 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be bench-marked against the needs of circuit designers at the bleeding edge of RF systems, where today

  • 2015 IEEE Radio and Wireless Symposium (RWS)

    This is a set of five conferences with a focus on wireless components, applications, and systems that effect both now and our future life style. These conferences main niche is to bring together technologists, circuit designers, system designers, and entrepreneurs at a single event. It was and is the place where these worlds meet, where new processes and systems can be benchmarked against the needs of circuit designers at the bleeding edge of RF systems, where today

  • 2014 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state -of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2013 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2012 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss hardware design and system performance of the state-of-the-art wireless systems. Includes an expanded program on the latest information on wireless communications and networking, and associated enabling technologies as new services and applications emerge.

  • 2011 IEEE Radio and Wireless Symposium (RWS)

    All aspects of components and systems related to radio and wireless networks.

  • 2010 IEEE Radio and Wireless Symposium (RWS)

    RWS focuses on the intersection between radio systems and wireless technology, which creates a unique forum for engineers to discuss various aspects of wireless communication systems and the state-of-the-art in both fields by exploring the connections between hardware design and system performance.

  • 2009 IEEE Radio and Wireless Symposium (RWS)

    This symposium highlights the state of the art of hardware and systems of radio and wireless

  • 2008 IEEE Radio and Wireless Symposium (RWS)

  • 2007 IEEE Radio and Wireless Symposium (RWS)

  • 2006 IEEE Radio and Wireless Symposium (RWS)

  • 2004 IEEE Radio and Wireless Conference - (RAWCON 2004)

  • 2003 IEEE Radio and Wireless Conference - (RAWCON 2003)

  • 2002 IEEE Radio and Wireless Conference - (RAWCON 2002)

  • 2001 IEEE Radio and Wireless Conference - (RAWCON 2001)

  • 2000 IEEE Radio and Wireless Conference - (RAWCON 2000)

  • 1999 IEEE Radio and Wireless Conference - (RAWCON '99)

  • 1998 IEEE Radio and Wireless Conference - (RAWCON '98)


2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


More Conferences

Periodicals related to Computer worms

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computer Graphics and Applications, IEEE

IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...


More Periodicals

Most published Xplore authors for Computer worms

Back to Top

Xplore Articles related to Computer worms

Back to Top

The quest for intruder-proof computer systems

IEEE Spectrum, 1989

The theft of US military information from Internet the research computer network built around the Defense Advanced Research Projects Agency's ARPAnet for academic use, is cited as an example of the computer break-ins that are focusing attention on computer security. The nature and extent of the threat are explored, and steps to combat it are described. Among them are encryption, ...


Optical disks become erasable

IEEE Spectrum, 1988

The characteristics of advantages of magneto-optical storage are discussed. The way in which such disks are written, read, and erased is described. The use of optical disks for image processing is examined. Also considered are the materials that made the technology practical; expected improvements in data rates; the lagging development of drives; and the anticipated increase in capacity.<>


A New Hybrid Diakoptic / Method of Lines to Electromagnetic Field Computation

Digest of the Fifth Biennial IEEE Conference on Electromagnetic Field Computation, 1992

None


Flow Based Botnet Detection

2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), 2009

Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint ...


Modeling the Spread of Worm Epidemics in Wireless Sensor Networks

2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009

The dramatic increase in the number of sensors with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such sensors networks. The most striking feature of worm in these networks is that they do not require Internet connectivity for their propagation but can spread directly from a sensor node to another ...


More Xplore Articles

Educational Resources on Computer worms

Back to Top

IEEE-USA E-Books

  • The quest for intruder-proof computer systems

    The theft of US military information from Internet the research computer network built around the Defense Advanced Research Projects Agency's ARPAnet for academic use, is cited as an example of the computer break-ins that are focusing attention on computer security. The nature and extent of the threat are explored, and steps to combat it are described. Among them are encryption, smart cards, and fingerprint readers.<<ETX>>

  • Optical disks become erasable

    The characteristics of advantages of magneto-optical storage are discussed. The way in which such disks are written, read, and erased is described. The use of optical disks for image processing is examined. Also considered are the materials that made the technology practical; expected improvements in data rates; the lagging development of drives; and the anticipated increase in capacity.<>

  • A New Hybrid Diakoptic / Method of Lines to Electromagnetic Field Computation

    None

  • Flow Based Botnet Detection

    Botnet is a collection of computer hosts exploited by malicious software that is remotely controlled through a command and control channel. More new types of attacks invented based on Botnets. Because of usage of legitimate IRC (Internet Relay Chat) servers to command and control the bots, it is hard to detect and remove Botnets. Flow information may keep the fingerprint of bots and can be used to identify IRC-based Botnets. The proposed method applies flow correlation for grouping the same activities of the same IRC-based bots. After flow correlation, the normal IRC and abnormal IRC traces are identified by scoring technique.

  • Modeling the Spread of Worm Epidemics in Wireless Sensor Networks

    The dramatic increase in the number of sensors with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such sensors networks. The most striking feature of worm in these networks is that they do not require Internet connectivity for their propagation but can spread directly from a sensor node to another sensor node using a short-range radio communication technology. In this paper, we model and analyze the spread of worm in wireless sensor networks using the epidemic theory. From numerical simulation results, we observe that the process of worm propagation is very sensitive to the density of nodes, the energy consumption of nodes and the sleep and work interleaving schedule policy for nodes. Therefore, our simulation study can provide insight into deriving a formal model to characterize worm propagation in sensor networks.

  • Modeling Virus Propagation in Peer-to-Peer Networks

    The popularity of peer-to-peer (P2P) networks makes them an attractive target to the creators of viruses and other malicious code. Indeed, recently a number of viruses designed specifically to spread via P2P networks have emerged. In this paper we present a model which predicts how a P2P-based virus propagates through a network. This model is a modified version of the S-E-I (susceptible- exposed-infected) model from the field of epidemiology. Our model classifies each peer as falling into one of three categories based on the number of infected files it is sharing. We derive differential equations which comprise the deterministic model and examine the expected behaviour of the P2P network as predicted by these equations

  • Mobile phone vulnerabilities: a new generation of malware

    None

  • The application of the PPPOE for network security management using RouterOS

    Aiming at the security problems of network management,the paper describes the basic principle of PPPOE agreement based on the RouterOS. The paper shows that PPPOE services are realized by using RouterOS. At last combined with the application of the campus network of Huangshi Institute of Technology, gives out a PPPOE access program based on campus network. The conclusion demonstrate: the PPPOE using RouterOS could significantly improve the security of network well.

  • The Application of Simulation Technique on Gearbox Design

    The dynamical model of gear transmission system was analyzed according to gear transmission principles and dynamical simulation model of gear pairs was given based on contact calculation method. Due to this method, the virtual prototype model of gearbox was created by considering many factors that influenced dynamical responses. The calculation result react the action of actual gears meshing very well. The simulation method and results have an important reference value and guidance to engineering design and capability checkout for gearbox.

  • Impulsive Control of the Spread of Worms

    A SIR epidemic model with dynamic input-output property is presented. The dynamics of this model under pulse control are analyzed which we referred to as the worms propagation with impulsive control (WPIC) model. For the WPIC model we established the conditions and threshold to the existence of the disease-free T-periodic solution and proved that the disease-free T-periodic solution is globally asymptotically stable.



Standards related to Computer worms

Back to Top

No standards are currently tagged "Computer worms"


Jobs related to Computer worms

Back to Top