When.com Web Search

  1. Ads

    related to: cyber security ieee papers

Search results

  1. Results From The WOW.Com Content Network
  2. IEEE Transactions on Information Forensics and Security

    en.wikipedia.org/wiki/IEEE_Transactions_on...

    The IEEE Transactions on Information Forensics and Security is a scientific journal published by the IEEE Signal Processing Society (IEEE SPS). [1] The journal is co-sponsored by several of the subject societies that make up the IEEE: IEEE Communications Society, IEEE Computational Intelligence Society, IEEE Computer Society, IEEE Engineering in Medicine and Biology Society, and the IEEE ...

  3. IEEE Security & Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Security_&_Privacy

    It covers security, privacy, and dependability of computer-based systems. The publication includes studies, surveys, tutorials, columns, and in-depth interviews of interest to the information security industry. [1] The editor in chief is Sean Peisert; [2] the preceding editor was David M. Nicol.

  4. IEEE Symposium on Security and Privacy - Wikipedia

    en.wikipedia.org/wiki/IEEE_Symposium_on_Security...

    In response to this incident, IEEE S&P committed to adding a ethics review step in their paper review process and improving their documentation surrounding ethics declarations in research papers. History

  5. List of IEEE publications - Wikipedia

    en.wikipedia.org/wiki/List_of_IEEE_publications

    The publications of the Institute of Electrical and Electronics Engineers (IEEE) constitute around 30% of the world literature in the electrical and electronics engineering and computer science fields, [citation needed] publishing well over 100 peer-reviewed journals. [1]

  6. The Protection of Information in Computer Systems - Wikipedia

    en.wikipedia.org/wiki/The_Protection_of...

    The following design principles are laid out in the paper: Economy of mechanism: Keep the design as simple and small as possible. Fail-safe defaults: Base access decisions on permission rather than exclusion. Complete mediation: Every access to every object must be checked for authority. Open design: The design should not be secret.

  7. Security information and event management - Wikipedia

    en.wikipedia.org/wiki/Security_information_and...

    Security as a service : These security services often include authentication, anti-virus, anti-malware/spyware, intrusion detection, penetration testing and security event management, among others. In practice many products in this area will have a mix of these functions, so there will often be some overlap – and many commercial vendors also ...

  8. International Carnahan Conference on Security Technology

    en.wikipedia.org/wiki/International_Carnahan...

    The IEEE International Carnahan Conference on Security Technology (ICCST) is an annual IEEE conference related to security technology, with a particular focus on physical security, biometrics, information security, threat detection, and cyber security. [1]

  9. List of computer science awards - Wikipedia

    en.wikipedia.org/wiki/List_of_computer_science...

    Best student paper Machtey Award: IEEE Symposium on Foundations of Computer Science: ... Cyber Security Challenge UK: Cyber security competition for school children ...