Upcoming IEEE Conferences Cover Malware and Identity Protection

Other topics include cloud security and mobile privacy

6 March 2015

FEATURED CONFERENCE

  • IEEE Symposium on Security and Privacy

    SAN JOSE, CALIF.; 18–20 MAY

    TOPICS: Access control, accountability, application security, cyberattacks and defenses, authentication, cloud security, forensics, intrusion detection, malware, mobile privacy and security, security architectures, privacy policies, Web security and privacy, and embedded and distributed systems.

    SPONSOR: IEEE Computer Society

  • IEEE International Symposium on Technologies for Homeland Security

    WALTHAM, MASS.; 14–16 APRIL

    TOPICS: Cybersecurity, biometrics and forensics, land and maritime border security, cyberattack and disaster preparation, cloud computing, big data, personnel screening, secure information sharing, supply chain monitoring and defense, telecommunications security, and system and network recovery.

    SPONSOR: IEEE-USA

  • IEEE International Symposium on Hardware-Oriented Security and Trust

    MCLEAN, VA.; 5–7 MAY

    TOPICS: Cyberattacks and detection techniques, hardware-based security, trust protocols, trusted information flow, remote enabling and disabling techniques for integrated circuits, intellectual property and watermarking, hardware metering, supply chain risk mitigation, and secure remote sensing.

    SPONSOR: IEEE Computer Society

  • IEEE International Conference on Trust, Security, and Privacy in Computing and Communications

    HELSINKI; 20–22 AUGUST

    TOPICS: Network computing, operating systems, software and applications, social networks, e-commerce, mobile and wireless communications, Web applications, parallel and distributed systems, and cloud computing.

    SPONSOR: IEEE Computer Society

  • IEEE Conference on Communications and Network Security

    FLORENCE, ITALY; 28–30 SEPTEMBER

    TOPICS: Privacy and anonymity, biometric authentication and identity management, computer and network forensics, data and application security, data protection, location security, outsourcing of network and data communications services, traffic analysis, and intrusion detection and prevention.

    SPONSOR: IEEE Communications Society

Learn More