Conferences related to Information Security

Back to Top

2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM)

The scope of the 2020 IEEE/ASME AIM includes the following topics: Actuators, Automotive Systems, Bioengineering, Data Storage Systems, Electronic Packaging, Fault Diagnosis, Human-Machine Interfaces, Industry Applications, Information Technology, Intelligent Systems, Machine Vision, Manufacturing, Micro-Electro-Mechanical Systems, Micro/Nano Technology, Modeling and Design, System Identification and Adaptive Control, Motion Control, Vibration and Noise Control, Neural and Fuzzy Control, Opto-Electronic Systems, Optomechatronics, Prototyping, Real-Time and Hardware-in-the-Loop Simulation, Robotics, Sensors, System Integration, Transportation Systems, Smart Materials and Structures, Energy Harvesting and other frontier fields.


2019 11th International Conference on Computational Intelligence and Communication Networks (CICN)

11th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to support intelligentsolutions for society. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication networks with the goal of exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will enhance collaboration across disciplines in order to support novel breakthroughs in the field.

  • 2018 10th International Conference on Computational Intelligence and Communication Networks (CICN)

    10th International Conference on Computational Intelligence and Communication Networks (CICN 2017) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation.

  • 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Image, Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• Digital Design, VLSI and SOC • Data Mining, Big data, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence • Power Electronics, Transmission and Power Systems • Computer Vision and Artificial Intelligence • Bio-informatics, Biometry and Medical Imaging• Information security,Network Security and Steganography • Remote sensing and GIS

  • 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN ? Sensors and networks (wireless ad hoc N/W, Vehicular N/W) ? Acoustic and under water electronics/communication and sonar systems ? Signal and Speach Processing ? Microwave IC, antennas and Wave Propagation ? Modeling and simulation ? VLSI Design and SOC ? Data Mining, Ontology and Web Services ? Parallel and distributed systems ? Telecommunication and Mobile communication ? Grid, Cloud, High Speed/Performance and Green Computing ? RFIDs and applicatons ? Embedded systems and Hardware Design/Implementation ? Mobile Computing, Computational Intelligence

  • 2015 International Conference on Computational Intelligence and Communication Networks (CICN)

    Soft computing, Fuzzy Logic and ANN • Sensors and networks (wireless ad hoc N/W, Vehicular N/W) • Acoustic and under water electronics/communication and sonar systems • Signal and Speach Processing • Microwave IC, antennas and Wave Propagation • Modeling and simulation• VLSI Design and SOC • Data Mining, Ontology and Web Services • Parallel and distributed systems• Telecommunication and Mobile communication • Grid, Cloud, High Speed/Performance and Green Computing • RFIDs and applicatons• Embedded systems and Hardware Design/Implementation • Mobile Computing, Computational Intelligence

  • 2014 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN 2014) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. It is expected that researchers will bring new prospect for collaboration across disciplines and gain idea facilitating novel breakthrough. The theme for this conference is Innovating and Inspiring the researchers to adopt the outcome for implementation. The conference will provide an exceptional platform to the researchers to meet and discuss the utmost solutions, scientific results and methods in solving intriguing problems with people that actively involved in these evergreen fields. T

  • 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN)

    Topics

  • 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN)

    The lnternational Conference CICN 2012 aims to bring together researchers, engineers, developers and practitioners from academia and industry working in all major areas and interdisciplinary to brainstorm for fruitful results and applications.

  • 2011 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2011) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.

  • 2010 International Conference on Computational Intelligence and Communication Networks (CICN)

    The International Conference on Computational Intelligence and Communication Networks (CICN2010) is organized to address various issues to prosper the creation of intelligent solutions in future. The aim is to bring together worldwide leading researchers, developers, practitioners and educators interested in advancing the state of the art in computational intelligence and communication Networks for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities.


2019 21st European Conference on Power Electronics and Applications (EPE '19 ECCE Europe)

Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies


2019 41st Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore


2019 IEEE 28th International Symposium on Industrial Electronics (ISIE)

The conference will provide a forum for discussions and presentations of advancements inknowledge, new methods and technologies relevant to industrial electronics, along with their applications and future developments.


More Conferences

Periodicals related to Information Security

Back to Top

Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Broadcasting, IEEE Transactions on

Broadcast technology, including devices, equipment, techniques, and systems related to broadcast technology, including the production, distribution, transmission, and propagation aspects.


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


More Periodicals


Xplore Articles related to Information Security

Back to Top

A conceptual analysis of information security education, information security training and information security awareness definitions

The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), 2014

The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness. An investigation to determine if any differences exist between information security education, information security training and information security awareness was conducted. This was done to help ...


Issues of information security control in virtualization segment of company information system

2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), 2016

The paper refers such information security control aspects as generation of information security policy and checking of information protection in virtual infrastructure of company's information system.


Research on information security cost based on game-theory

2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA), 2013

This paper analyzed the interdependence of information security issues, based on the expected benefit of cost and security loss of the interdependence of information security agents in a network, a model which simulates the information security cost analysis has been built. An information security cost game model is set up based on payoff matrix, the main strategy are divided into ...


Study on the General Defects in the Information Security Management System (ISMS)

2006 ITI 4th International Conference on Information & Communications Technology, 2006

In the wave of the progressive informatization process, Korean enterprises are making a vast amount and range of investments in the information security sector in order to counter the information dysfunction. In addition, to achieve an objective evaluation thereon, they have been increasingly exhibiting a preference for a certification system of information security management, as developed by the government This ...


Approach to information security control of complex computer networks

2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM), 2016

This research considers a structure of metrics enabling estimation the information security status in a complex computer network. The structure under consideration consists of 4 layers: integral layer, subnet layer, segment layer and host layer. Each layer contains a set of metrics reflecting particular aspects of the network functioning on this layer. The process of information security management consists in ...


More Xplore Articles

Educational Resources on Information Security

Back to Top

IEEE-USA E-Books

  • A conceptual analysis of information security education, information security training and information security awareness definitions

    The importance of information security education, information security training, and information security awareness in organisations cannot be overemphasised. This paper presents working definitions for information security education, information security training and information security awareness. An investigation to determine if any differences exist between information security education, information security training and information security awareness was conducted. This was done to help institutions understand when they need to train or educate employees and when to introduce information security awareness programmes. A conceptual analysis based on the existing literature was used for proposing working definitions, which can be used as a reference point for future information security researchers. Three important attributes (namely focus, purpose and method) were identified as the distinguishing characteristics of information security education, information security training and information security awareness. It was found that these information security concepts are different in terms of their focus, purpose and methods of delivery.

  • Issues of information security control in virtualization segment of company information system

    The paper refers such information security control aspects as generation of information security policy and checking of information protection in virtual infrastructure of company's information system.

  • Research on information security cost based on game-theory

    This paper analyzed the interdependence of information security issues, based on the expected benefit of cost and security loss of the interdependence of information security agents in a network, a model which simulates the information security cost analysis has been built. An information security cost game model is set up based on payoff matrix, the main strategy are divided into "investment security costs" and "do not input the security cost", which using Nash equilibrium and thus support the decision of the agents' security cost.

  • Study on the General Defects in the Information Security Management System (ISMS)

    In the wave of the progressive informatization process, Korean enterprises are making a vast amount and range of investments in the information security sector in order to counter the information dysfunction. In addition, to achieve an objective evaluation thereon, they have been increasingly exhibiting a preference for a certification system of information security management, as developed by the government This study aims to reduce the possible trials and errors while promoting the establishment and certification of the information security management system by enterprises. To satisfy this purpose, this study presents the defects by item found during the certification process of the information security management system of a number of enterprises. By analyzing the derived defects, we have outlined the issues to be attended to among enterprises at each stage of the establishment of an information security management system. The study also presents a reference model for conducting a self check, so that companies may be able to self-verify the completeness of their establishment of the information security management system. Through the results of this study, enterprises will be able to self-verify their completeness levels when promoting the establishment and certification of the information security management system, and improve the efficiency and effectiveness thereof so as to raise the general level and awareness among enterprises of the importance of information security.

  • Approach to information security control of complex computer networks

    This research considers a structure of metrics enabling estimation the information security status in a complex computer network. The structure under consideration consists of 4 layers: integral layer, subnet layer, segment layer and host layer. Each layer contains a set of metrics reflecting particular aspects of the network functioning on this layer. The process of information security management consists in selecting the subset of metrics according to a specific management task, monitoring and forecasting the metrics and applying protective measures.

  • Problems of information security technology the “Internet of Things”

    In the article the questions of application of the so-called technology of “Internet of things”. Analysis of the content and prospects of the development. Systematized and generalized information security of this technology, feasible solutions to existing problems. Detailed considered the triad of information security - confidentiality, integrity, availability.

  • Enhancing information security education and awareness: Proposed characteristics for a model

    The use of models has been one of the prevalent approaches to enhancing information security education and awareness in existing literature. Models provide step by step problem solving opportunities and are thus essential in security education and awareness activities. This paper categorized models for enhancing security education and awareness based on their stakeholder domains into: End-Users, Institutions and Industry domains. Analysis of literature on information security education and awareness indicates that approaches for enhancing end-users' security knowledge do exist, as do models for promoting organizational security knowledge in the industry domain. However, only one model was found to exist for enhancing security knowledge of employees in the institutions domain. This paper therefore describes a gap identified in the existing information security education and awareness models and presents the required relevant characteristics for developing information security education and awareness models for bridging the gap (in the institutions domain). The paper also evaluates and compares characteristics of existing models in order to identify the most relevant characteristics for a new model and makes a presentation to that effect. This was done through a review of existing literature on information security education and awareness models and a comparative analysis of models identified in the three domains.

  • The new aspects for the instantaneous information security audit

    This publication discusses the problem concerning the concept of the instantaneous information security (IT-Security) audits directed, including providing protection against “zero-day” threats. It is noted that effective “zero-day” counteraction based on implementation a set of preventive IT- Security controls, but not limited new technical facilities installation only. A key feature of this concept of instantaneous IT-Security audits is to assess how the left limit of the protection level in the process of IT-Security audits performing. Methodological basis of the concept of instantaneous IT- Security audits are ISO 27001 and 19011 standards series, supplemented by many (expandable) IT-Security metrics to quantify the object protection level. The obtained results can find application in create of models and methods of IT- Security audits performing and continuous improvement of an object protection under the influence of IT-Security violation threats.

  • The Design of Information Security System for Digital Power Grid

    Digital power grid (DPG) is a highly informatized systems with multi-level and multi-area. According to the features of DPG, a information security system is presented with its key functions. The design adopts master-slave mode to implement security policy. 2-layer encryption mechanism is proposed to guarantee information security and integrity. The license structure based on XML can strengthen the flexibility of information security policies and the extensibility of information rights.

  • The information security system synthesis using the graphs theory

    Timely prevention information security threats, provided by specialized software and hardware, is the effective business foundation, allowing to reduce reputational and financial risks for the company. At the same time, protection must be implemented in all detractors' possible attacks areas. If we turn to the Russian Federation leISSlation, then the FSTEC order No31 of March 14, 2014 may be adopted as the basis for “isolating” the protection vectors, according to which the basic measures for protection should be provided at the following levels: access subjects identification and authentication, access delineation, software restriction, computer storage media protection, etc. (There are 21 of them). On the hardware and software complex basis that implement protection at each of these levels, an enterprise information security system is created. To select the most appropriate software and hardware information security, and, therefore, to build an optimal enterprise information protection system, one can turn to graph theory. In this case, the problem is reduced to the ranked descending graph construction and the optimality problem solution, i.e. critical (maximal) path of this graph calculation. Each graph level corresponds to a specific subsystem of the information security system, while the subsystems are located in the alleged overcoming order protection by the attacker; tops - the considered information security tools; the graph is weighted, the each its arcs weight corresponds to the expert evaluation of the preference for using a particular tool.



Standards related to Information Security

Back to Top

IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies requirements for cryptographic units that provide encryption and authentication for data contained within storage media. Full interchange requires additional format specifications (such as compression algorithms and physical data format) that are beyond the scope of this standard.


IEEE Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices

This standard specifies elements of an architecture for cryptographic protection of data on block-oriented storage devices, describing the methods, algorithms, and modes of data protection to be used.


IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...


IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


More Standards

Jobs related to Information Security

Back to Top