Network Security Research Papers Ieee Xplore

On By In 1

Conferences related to Network Security

Back to Top

2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

Promote the exchange of ideas between academia and industry in the field of computer and networks dependability

  • 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    The IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) is the most prestigious international forum for presenting advanced and innovative research results, problem solutions, practices, insights on new challenges in the field of dependable computing and security. The whole spectrum of IT systems and application areas with stringent relevant dependability and security concerns are of interest to DSN. All aspects of dependable and secure systems and networks are within the scope of DSN, including innovative architectures, protocols and algorithms, models for performance and dependability evaluation, as well as, experimentation and assessment of dependable and secure systems and networks.

  • 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    Presenting the very best research results, problem solutions and insights on new challenges in the field of dependable computing and security.

  • 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    Dependable systems must be reliable, trustable, available and resilient to malicious attacks, accidental faults and design errors to attend our society, strongly dependent on computers and software products. Computermalfunctioning in various application areas, such as bank transactions, transportation, medical equipment, satellites, telecommunication networks among others, can impact people who use vulnerable systems and services.The researches developed in these areas aiming for dependability of systems and software can find in DSN the most important conference in the world to discuss how such systems should be developed, tested and evaluated.The conference offers an international forum to present research results, solutions to problems, insights into emerging challenges in a rich program addressing multiple facets of dependable and secure computing, and network.

  • 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    All aspects of dependability and security, from hardware, software, systems, and networking perspectives.

  • 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    DSN is the premier international conference for presenting research results, problem solutions, and insight on new challenges facing the field of dependability and security. DSN explores the fusion between security and dependability, addressing the need to simultaneously fight against cyber attacks, accidental faults, design errors, and unexpected operating conditions.

  • 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

    DSN is the premier international conference for presenting research results, problem solutions, and insight on new challenges facing the field of dependability and security. DSN explores the fusion between security and dependability, addressing the need to simultaneously fight against cyber attacks, accidental faults, design errors, and unexpected operating conditions.

  • 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)

    DSN is the premier international conference on dependability and security. Topics include Architectures for Dependable, Secure and Resilient Computer Systems; Dependability Modeling and Prediction; Dependability and security of hardware technologies; Fault-Toleranc; Internet Dependability; Intrusion-Tolerance; Safety-Critical Systems; Software Testing, V&V; Software Reliability; Performance and Dependability Assessment;; Failure, Vulnerability and Threat Analysis.

  • 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)

    DSN is the premier international conference for presenting the very best research results, problem solutions, and insight on new challenges facing the field of dependability and security. As in previous years, DSN 2010 will incorporate the Dependable Computing and Communications Symposium (DCCS) and the Performance and Dependability Symposium (PDS). DSN's schedule will include workshops and tutorials on the first day and a three day conference with parallel tracks that include full papers, a student forum,

  • 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN)

    DSN is the main forum for presenting and discussing latest results on the dependability and security of computer systems and networks, covering design, architecture, validation and evaluation related challenges and solutions.

  • 2008 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)
  • 2007 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)
  • 2006 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)
  • 2005 IEEE International Conference on Dependable Systems & Networks With FTCS & DCC (DSN)

2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions

  • 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)

    IEEE CCNC 2017 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions

  • 2016 13th IEEE AnnualConsumer Communications & Networking Conference (CCNC)

    IEEE CCNC 2016 will have separate research sessions and industry sessions. The research sessions will present the latest developments and technical solutions in the areas of home networking, consumer networking, mobile networking, social networking, enabling technologies (such as middleware), and novel applications and services.

  • 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)

    Dedicated to the advancement of consumer networking technologies, applications and services.

  • 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)

    IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC)

    IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2012 IEEE Consumer Communications and Networking Conference (CCNC)

    is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2011 IEEE Consumer Communications and Networking Conference (CCNC)

    Is major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking.

  • 2010 7th IEEE Consumer Communications and Networking Conference (CCNC)

    Consumer Communications and Networking Conference (CCNC) was developed by the IEEE Communications Society in order to bring together the latest in communications and networking technology with the utilization of that technology in consumer communications and networking devices, services and applications.

  • 2009 6th IEEE Consumer Communications and Networking Conference (CCNC)

    IEEE Consumer Communications and Networking Conference, sponsored by IEEE Communications Society, is a major annual international conference organized with the objective of bringing together researchers, developers, and practitioners from academia and industry working in all areas of consumer communications and networking. CCNC 2009 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware), and novel applicat

  • 2008 5th IEEE Consumer Communications and Networking Conference (CCNC)
  • 2007 4th IEEE Consumer Communications and Networking Conference (CCNC)
  • 2006 3rd IEEE Consumer Communications and Networking Conference (CCNC)
  • 2005 2nd IEEE Consumer Communications and Networking Conference (CCNC)
  • 2004 1st IEEE Consumer Communications and Networking Conference (CCNC)

2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)

The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field

  • 2017 IEEE Trustcom/BigDataSE/ICESS

    The scope of these conferences includes:Trusted computing platformTrusted network computingTrusted operating systemsTrusted software and applicationsTrust in social networks, Network securityComputer securityDatabase securityWeb applications security, Privacy in Web-based applications and servicesPrivacy in database systemsPrivacy in parallel and distributed systems, Big Data novel theory, algorithm and applicationsBig Data standardsBig Data mining and analyticsBig Data Infrastructure, MapReduce and Cloud ComputingBig Data visualizationBig Data curation and managementBig Data semantics, scientific discovery and intelligence, Security, privacy, trust, and legal issues to big data, MapReduce for Big Data processing, resource scheduling and SLAPerformance characterization, evaluation and optimization, Systems, Models and Algorithm, Design Methodology and Tools, Applications and Interdisciplinary Topics

  • 2016 IEEE Trustcom/BigDataSE/I¿SPA

    This conference is created to provide a prime international forum for researchers, industry practitioners and domain experts to exchange the latest advances in trusted computing and communications, concurrent and parallel systems, and Big Data and broadly related areas.

  • 2015 IEEE Trustcom/BigDataSE/I¿SPA

    Computer Science, in particular trust, security, privacy, big data, parallel and distributed processing, use of these in software defined networks and 5G

  • 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    Trust, Security and Privacy in Computing and Communications

  • 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    Trust, Security and Privacy in Computing and Communications

  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    TrustCom-2012 is an international conference for presenting and discussing emerging ideas and trends in trusted computing, communications, and networks from both the research community as well as the industry. Topics of interest include, but are not limited to Trust, Security, Privacy. TrustCom has a co-located conference IUCC-2012.

  • 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

    The conference aims at bringing together researchers and practitioners in the world working on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks, and providing a forum to present and discuss emerging ideas and trends in this highly challenging research field.


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)
  • 2007 9th International Conference Advanced Communication Technology (ICACT)
  • 2006 8th International Conference Advanced Communication Technology (ICACT)
  • 2005 7th International Conference Advanced Communication Technology (ICACT)
  • 2004 6th International Conference Advanced Communication Technology (ICACT)

2018 26th Signal Processing and Communications Applications Conference (SIU)

The general scope of the conference ranges from signal and image processing to telecommunication, and applications of signal processing methods in biomedical and communication problems.

  • 2017 25th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing and Communication Applications (SIU) conference is the most prominent scientific meeting on signal processing in Turkey bringing together researchers working in signal processing and communication fields. Topics include but are not limited to the areas of research listed in the keywords.

  • 2016 24th Signal Processing and Communication Application Conference (SIU)

    Signal Processing Theory, Statistical Signal Processing, Nonlinear Signal Processing, Adaptive Signal Processing, Array and Multichannel Signal Processing, Signal Processing for Sensor Networks, Time-Frequency Analysis, Speech / Voice Processing and Recognition, Computer Vision, Pattern Recognition, Machine Learning for Signal Processing, Human-Machine Interaction, Brain-Computer Interaction, Signal-Image Acquisition and Generation, image Processing, video Processing, Image Printing and Presentation, Image / Video / Audio browsing and retrieval, Image / Video / Audio Watermarking, Multimedia Signal Processing, Biomedical Signal Processing and Image Processing, Bioinformatics, Biometric Signal-Image Processing and Recognition, Signal Processing for Security and Defense, Signal and Image Processing for Remote Sensing, Signal Processing Hardware, Signal Processing Education, Radar Signal Processing, Communication Theory, Communication Networks, Wireless Communications

  • 2015 23th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing Theory Statistical Signal Processing Nonlinear Signal Processing Adaptive Signal Processing Array and Multichannel Signal Processing Signal Processing for Sensor Networks Time-Frequency Analysis Speech / Voice Processing and Recognition Computer Vision Pattern Recognition Machine Learning for Signal Processing Human-Machine Interaction Brain-Computer Interaction Signal-Image Acquisition and Generation image Processing video Processing Image Printing and Presentation Image / Video / Audio browsing and retrieval Image / Video / Audio Watermarking Multimedia Signal Processing Biomedical Signal Processing and Image Processing Bioinformatics Biometric Signal-Image Processing and Recognition Signal Processing for Security and Defense Signal and Image Processing for Remote Sensing Signal Processing Hardware Signal Processing Education Radar Signal Processing Communication Theory Communication Networks Wireless Communications

  • 2014 22nd Signal Processing and Communications Applications Conference (SIU)

    SIU will be held in Trabzon, Turkey at the Karadeniz Technical University Convention and Exhibition Centre on April 23, 2014. SIU is the largest and most comprehensive technical conference focused on signal processing and its applications in Turkey. Last year there were 500 hundred participants. The conference will feature renowned speakers, tutorials, and thematic workshops. Topics include but are not limited to: Signal Procesing, Image Processing, Communication, Computer Vision, Machine Learning, Biomedical Signal Processing,

  • 2013 21st Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2012 20th Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2011 19th Signal Processing and Communications Applications Conference (SIU)

    Conference will bring together academia and industry professionals as well as students and researchers to present and discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. The Conference will also include invited lectures, tutorials and special sessions.

  • 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU)

    S1.Theory of Signal-Processing S2.Statistical Signal-Processing S3.Multimedia Signal-Processing S4.Biomedical Signal-Processing S5.Sensor Networks S6.Multirate Signal-Processing S7.Pattern Recognition S8.Computer Vision S9.Adaptive Filters S10.Image/Video/Speech Browsing, Retrieval S11.Speech/Audio Coding S12.Speech Processing S13.Human-Machine Interfaces S14.Surveillance Signal Processing S15.Bioinformatics S16.Self-Learning S17.Signal-Processing Education S18.Signal-Processing Systems S1

  • 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU)

    The scope of the conference is to cover recent topics in theory and applications of Signal Processing and Communications.

  • 2008 IEEE 16th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing, Image Processing, Speech Processing, Pattern Recognition, Human Computer Interaction, Communication, Video and Speech indexing, Computer Vision, Biomedical Signal Processing

  • 2007 IEEE 15th Signal Processing and Communications Applications (SIU)
  • 2006 IEEE 14th Signal Processing and Communications Applications (SIU)
  • 2005 IEEE 13th Signal Processing and Communications Applications (SIU)
  • 2004 IEEE 12th Signal Processing and Communications Applications (SIU)

More Conferences

Periodicals related to Network Security

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


More Periodicals

Xplore Articles related to Network Security

Back to Top

Research on modeling for network security policy confliction based on network topology

[{u'author_order': 1, u'affiliation': u'School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, Sichuan China', u'full_name': u'Liang Li'}, {u'author_order': 2, u'affiliation': u'School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, Sichuan China', u'full_name': u'Shizhou Wu'}, {u'author_order': 3, u'affiliation': u'School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, Sichuan China', u'full_name': u'Lisheng Huang'}, {u'author_order': 4, u'affiliation': u'School of Computer Science & Engineering, University of Electronic Science and Technology of China, Chengdu 611731, Sichuan China', u'full_name': u'Wenyong Wang'}] 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), None

The consistency checking of network security policy is an important issue of network security field, but current studies lack of overall security strategy modeling and entire network checking. In order to check the consistency of policy in distributed network system, a security policy model is proposed based on network topology, which checks conflicts of security policies for all communication paths ...


Identity-based network security for commercial blockchain services

[{u'author_order': 1, u'affiliation': u'Marist College, Poughkeepsie, NY USA', u'full_name': u'Casimer DeCusatis'}, {u'author_order': 2, u'affiliation': u'Marist College, Poughkeepsie, NY USA', u'full_name': u'Marcus Zimmermann'}, {u'author_order': 3, u'affiliation': u'BlackRidge Technology, Reno, NV USA', u'full_name': u'Anthony Sager'}] 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), None

While blockchain services hold great promise to improve many different industries, there are significant cybersecurity concerns which must be addressed. In this paper, we present experimental test bed results for a novel method of user identity management for cloud-based blockchain applications. Using a BlackRidge Technology endpoint on a Windows host, we insert cryptographic identity tokens on the first packet to ...


Physical Layer Security Assisted 5G Network Security

[{u'author_order': 1, u'full_name': u'Fei Pan'}, {u'author_order': 2, u'full_name': u'Yixin Jiang'}, {u'author_order': 3, u'full_name': u'Hong Wen'}, {u'author_order': 4, u'full_name': u'Runfa Liao'}, {u'author_order': 5, u'full_name': u'Aidong Xu'}] 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), None

After 4G network becomes a global commercial success, the researchers are now looking at the future 5G technologies, both in standardization bodies and in research projects. Researchers find that the security architecture used in 4G can not satisfy the needs of 5G. Some researchers proposed a kind of unified network security architecture which we find it inflexible. In this paper, ...


Network security enhancement through effective log analysis using ELK

[{u'author_order': 1, u'affiliation': u'Network Security, PG School, Gujarat Technological University', u'full_name': u'Ibrahim Yahya Mohammed Al-Mahbashi'}, {u'author_order': 2, u'affiliation': u'Bhaskaracharya Institute for Space Applications and Geo-informatics, Gandhinagar, Gujarat, India 382007', u'full_name': u'M. B. Potdar'}, {u'author_order': 3, u'affiliation': u'Bhaskaracharya Institute for Space Applications and Geo-informatics, Gandhinagar, Gujarat, India 382007', u'full_name': u'Prashant Chauhan'}] 2017 International Conference on Computing Methodologies and Communication (ICCMC), None

The main aim for any organization is to provide protection for their critical assets because they are face to face with many external threats that may cause interruption on providing services to customers which will lead to economical and reputation disaster. As long as organizations need to provide the protection required to secure their business they have to focus on ...


Research on network security protection system based on dynamic modeling

[{u'author_order': 1, u'affiliation': u'State Grid Xinjiang Electric Power Research Institute, Urumqi, China', u'full_name': u'Fei Shu'}, {u'author_order': 2, u'affiliation': u'State Grid Xinjiang Electric Power Research Institute, Urumqi, China', u'full_name': u'Ming Li'}, {u'author_order': 3, u'affiliation': u'State Grid Xinjiang Information and Communication Corporation, Urumqi, China', u'full_name': u'ShuTing Chen'}, {u'author_order': 4, u'affiliation': u'State Grid Xinjiang Electric Power Research Institute, Urumqi, China', u'full_name': u'Xu Wang'}, {u'author_order': 5, u'affiliation': u'State Grid Xinjiang Electric Power Research Institute, Urumqi, China', u'full_name': u'Feng Li'}] 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), None

A dynamic modeling method for network security vulnerabilities which is composed of the design of safety evaluation model, the design of risk model of intrusion event and the design of vulnerability risk model. The model based on identification of vulnerabilities values through dynamic forms can improve the tightness between vulnerability scanning system, intrusion prevention system and security configuration verification system. ...


More Xplore Articles

Educational Resources on Network Security

Back to Top

eLearning

No eLearning Articles are currently tagged "Network Security"

IEEE-USA E-Books

  • Research on modeling for network security policy confliction based on network topology

    The consistency checking of network security policy is an important issue of network security field, but current studies lack of overall security strategy modeling and entire network checking. In order to check the consistency of policy in distributed network system, a security policy model is proposed based on network topology, which checks conflicts of security policies for all communication paths in the network. First, the model uniformly describes network devices, domains and links, abstracts the network topology as an undirected graph, and formats the ACL (Access Control List) rules into quintuples. Then, based on the undirected graph, the model searches all possible paths between all domains in the topology, and checks the quintuple consistency by using a classifying algorithm. The experiments in campus network demonstrate that this model can effectively detect the conflicts of policy globally in the distributed network and ensure the consistency of the network security policies.

  • Identity-based network security for commercial blockchain services

    While blockchain services hold great promise to improve many different industries, there are significant cybersecurity concerns which must be addressed. In this paper, we present experimental test bed results for a novel method of user identity management for cloud-based blockchain applications. Using a BlackRidge Technology endpoint on a Windows host, we insert cryptographic identity tokens on the first packet to request a new session. A corresponding gateway appliance in the cloud enforces security policy, blocking unauthorized access at or below the transport layer. Results of penetration testing a sample Hyperledger 1.0 application are discussed. We also demonstrate network segmentation and traffic separation, which allows multiple organizations to share blockchain infrastructure and facilitates compliance auditing.

  • Physical Layer Security Assisted 5G Network Security

    After 4G network becomes a global commercial success, the researchers are now looking at the future 5G technologies, both in standardization bodies and in research projects. Researchers find that the security architecture used in 4G can not satisfy the needs of 5G. Some researchers proposed a kind of unified network security architecture which we find it inflexible. In this paper, we will propose a more flexible hierarchical security architecture which can be adjusted to the needs of the application scenarios of 5G-eMBB, mMTC and URLLC. Under this architecture, we will introduce a cross-layer light weight authentication scheme and a novel physical layer security assisted encryption scheme which is based on both the key streams and the channel information in f-OFDM system.

  • Network security enhancement through effective log analysis using ELK

    The main aim for any organization is to provide protection for their critical assets because they are face to face with many external threats that may cause interruption on providing services to customers which will lead to economical and reputation disaster. As long as organizations need to provide the protection required to secure their business they have to focus on two types of threats, internal and external threats. In previous paper [1] I have discussed about external threats and in this paper I will draw more attention on how the internal threats that will affect the overall network security mechanism. Log analysis can also help us to reveal the gap existed on our safeguards, which used to provide a protection for our systems, by which we can have a knowledge from the information extracted from our data that will help us to be aware of the gaps and vulnerabilities may found to resolve them before we become victims. For log analysis I will use ELK stack that will help me to receive the forwarded logs from a well-known commercial safeguard deployed in a real environment.

  • Research on network security protection system based on dynamic modeling

    A dynamic modeling method for network security vulnerabilities which is composed of the design of safety evaluation model, the design of risk model of intrusion event and the design of vulnerability risk model. The model based on identification of vulnerabilities values through dynamic forms can improve the tightness between vulnerability scanning system, intrusion prevention system and security configuration verification system. Based on this model, the network protection system which is most suitable for users can be formed, and the protection capability of the network protection system can be improved.

  • Light Source and Trail Recognition via Optical Spectrum Feature Analysis for Optical Network Security

    In this letter, we propose a light source and trail recognition method via machine-learning-based optical spectrum feature analysis (OSFA) for optical network security. In order to realize light source and light trail recognition, we proposed a t-distribution stochastic neighbor embedding (t-SNE) and support vector machine (SVM) based OSFA method for stand-alone system. In order to improve the recognition accuracy, we further proposed a derivative cooperative multi-node recognition (CoMNR) mechanism. Experimental results show that 100% and 98.5% recognition accuracy for light sources and light trails can be achieved respectively at a single node. When CoMNR is adopted, the light trail recognition accuracy can be further improved to 100%.

  • Network security analysis SCADA system automation on industrial process

    Supervisory Control and Data Acquisition (SCADA) is a unit control system that has been used almost in various industries around the world in terms of process automation. This system delineates the real infrastructure and provides ease in operations and monitoring, but this system has vulnerability in the security aspects of data communications connected between SCADA support devices. This can have a major impact on industry and the economy. This research was conducted by designing and building SCADA infrastructure and analyzing vulnerability threats to SCADA network security. This research penetrates SCADA network using Kali Linux and data traffic analysis on SCADA network using Wireshark. From the results of Wireshark analysis got the attacker with User Anonymous. Analysis performed with normal and abnormal data traffic conditions. The result of this research is penetration of SCADA network using Kali Linux, which is used to attack and make data traffic between Programable Logic Controller (PLC) with Human Machine Interface (HMI) becomes solid, and result from penetration testing, SCADA system become down due of data traffic on a dense network, thereby indicating that SCADA networks are vulnerable to malware threats and attacks, the results of this study are recommendations and network security strategy SCADA system.

  • Implementation of network security based data hauling by collaborative spectrum sensing in cognitive radio network

    Cognitive Radio has been proposed as a solution to alleviate the increasing demand for Radio spectrum. Collaborative Spectrum Sensing (CSS) can be used to increase the pursuit of Spectrum holes efficiently. But CSS doesn't bother about the network security. Hence., Energy efficient collaborative spectrum sensing (EE-CSS) protocol based on trust and Reputation management is proposed. Trust and reputation management system (TRMS) have been proposed to combat malicious behavior in CRN. TRM unit Calculates the Trust Value for each Secondary User's and find out the attacker nodes and drops them out from the network. EE-CSS protocol improves the Energy Efficiency by Reducing the Total Number of Local decisions i.e. sensed energy level, between secondary users and its Fusion Centre. Since each sensing report requires energy for transmission, processing and receiving it must be reduced to improve energy efficiency. This CR Network is subjected to two varieties of routing protocols such as AODV and Hybrid Routing Algorithm. Finally the graphical result shows that the Energy consumption, Performance Delay in EE-CSS can be much lowered compared to Traditional CSS method.

  • A survey of wireless sensor network security in the context of Internet of Things

    Today, the common vision of smart components is usually based on the concept of the Internet of Things (IoT). Intelligent infrastructures combine sensor networks, network connectivity and software to oversee and analyze complex systems to identify inefficiencies and inform operational decision-making. Wireless Sensor nodes collect operational information over time and provide real-time data on current conditions such as (volcano activities, disaster parameters in general). The security of wireless sensor networks in the world of the Internet of Things is a big challenge, since there are several types of attacks against different layers of OSI model, in their goal is falsified the values of the detected parameters.

  • SU-PhysioDB: A physiological signals database for body area network security

    This paper presents a new physiological signals database, SU-PhysioDB, that contains simultaneous measurements of electrocardiogram (ECG), blood pressure (BP) and body temperature (BT) signals. SU-PhysioDB can be used to evaluate the performance of the security mechanisms designed for the communication among the biosensors within Body Area Networks (BANs). We present a detailed description of our SU-PhysioDB database along with providing a performance comparison of two specific physiological parameter generation techniques using a public database and our SU-PhysioDB da-tabase. Results show that our SU- PhysioDB database is a pros-pering option to be used while evaluating the performance of a bio-cryptographic security infrastructure designed for BANs.



Standards related to Network Security

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.


More Standards

Хорошенькая картинка. Беккер застонал и провел рукой по волосам. - Когда он вылетает. - В два часа ночи по воскресеньям. Она сейчас наверняка уже над Атлантикой.

0 comments

Leave a Reply

Your email address will not be published. Required fields are marked *