When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. IEEE Transactions on Information Forensics and Security

    en.wikipedia.org/wiki/IEEE_Transactions_on...

    The IEEE Transactions on Information Forensics and Security is a scientific journal published by the IEEE Signal Processing Society (IEEE SPS). [1] The journal is co-sponsored by several of the subject societies that make up the IEEE: IEEE Communications Society, IEEE Computational Intelligence Society, IEEE Computer Society, IEEE Engineering in Medicine and Biology Society, and the IEEE ...

  3. IEEE Symposium on Security and Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Symposium_on_Security...

    The review process for the conference tends to evaluate the papers on a variety of criteria with a focus on novelty. In 2022, researchers interviewed reviewers from top security conferences like IEEE S&P and found that the review process of the conferences was exploitable due to inconsistent reviewing standards across reviewers.

  4. List of IEEE publications - Wikipedia

    en.wikipedia.org/wiki/List_of_IEEE_publications

    Circuits and Systems I: Regular Papers, IEEE Transactions on; Circuits and Systems II: Express Briefs, IEEE Transactions on; Circuits and Systems, IEEE Open Journal of; Circuit Theory, IEEE Transactions on (originally named Circuit Theory, IRE Transactions on) Cloud Computing, IEEE Transactions on; Cognitive and Developmental Systems, IEEE ...

  5. IEEE Xplore - Wikipedia

    en.wikipedia.org/wiki/IEEE_Xplore

    IEEE Xplore (stylized as IEEE Xplore) digital library is a research database for discovery and access to journal articles, conference proceedings, technical standards, and related materials on computer science, electrical engineering and electronics, and allied fields.

  6. Security information and event management - Wikipedia

    en.wikipedia.org/wiki/Security_information_and...

    Cybersecurity professionals now rely on logging data to perform real-time security functions, driven by governance models that incorporate these processes into analytical tasks. As information assurance matured in the late 1990s and into the 2000s, the need to centralize system logs became apparent.

  7. IEEE Security & Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Security_&_Privacy

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file

  8. The Protection of Information in Computer Systems - Wikipedia

    en.wikipedia.org/wiki/The_Protection_of...

    The following design principles are laid out in the paper: Economy of mechanism: Keep the design as simple and small as possible. Fail-safe defaults: Base access decisions on permission rather than exclusion. Complete mediation: Every access to every object must be checked for authority. Open design: The design should not be secret.

  9. IEEE Rebooting Computing - Wikipedia

    en.wikipedia.org/wiki/IEEE_Rebooting_Computing

    The aim was to develop a strategy to coordinate efforts to apply AI/ML to improve cybersecurity worldwide. Following this workshop, an IEEE Trend Paper was published [54] entitled "Artificial Intelligence and Machine Learning Applied to Cybersecurity", with recommendations for new standards and regulations for industry and government. A second ...