CyberC 2020 filling the 12th network distributed computing and international conference on knowledge discovery
CyberC academic conference CyberC academic conference on February 10,
The Call for cca shut
The 12 th International Conference on Cyber - Enabled Distributed Computing and Knowledge Discovery (CyberC)
Chongqing, China, September 17 to 19, 2020,
The Technical Co - sponsors: IEEE, IEEE ComputerSociety, IEEE TCSIM (Technical Committee on Simulation), IEEE CommunicationsSociety (ComSoc) Technical Committee on Big Data (TCBD)
Organizer: Chongqing University of Posts and Telecommunications
Co - hosted by: a working University of Posts & amp; Telecommunications, Zhengzhou University, Peng Cheng that Chongqing Institute of Engineering
Sponsored by: ZTE, Huawei, AT& T, InfoBeyond, Tech Mahindra
Web: www.Cyberc.org
Publication: the IEEE (EI & amp; Explore); Special Issue: Journal of Sensors (EI, Impact Factor of 2.475) Submission Due Date: April 21, 2020,
Paper submission: EDAS (HTTPS//EDAS. Info/N26997), or Submit your Paper to email [email protected] with the title of "CyberC 2020 submission".
Contact Us: [email protected]/CyberC QQ: 1625638480
2020 Theme: Cyber Computingof AI, Blockchain, Big Data, Image, and 5G Scopes: CyberC promotes an in-depth exploration of the most recent research and developments in the areas of AI, Blockchain, big data, distributed computing, clouds, cybersecurity, image computing, mobile computing, the Internet of Things, and other cyber-based technologies. Professors, scientists, engineers, and students in these areas are encouraged to participate. CyberC also welcomes industrial participation. Summits: CyberC 2020 co-hosts Emerging Technology Summit (AI, Blockchain, Big Data, Image, 5G) forum that emphasizes innovative and state-of-art R& D, industry products, specifications, showcases, tutorials, technical transitions, and markets.
Switchable viewer:
The switchable viewer of interests include, but not limited to:
Cyber Network and Cyber Security
Cyber network, the configuration, cloud, IoT, and wireless communications,
DDoS, Ransomware, and cybersecurity attacks and detection
Multistage attacks, data security, AI and intrusion detection
Risk assessment, management, and network monitoring
The Authentication and Access Control
Learning model for attack behaviors, prediction, and game going to
IoT and security
Deploying the machine learning and AI to enhance the security and privacy
Cyber security and privacy
Blockchain found and its applications, smart grid, healthcare, ICS, etc.)
Deploying the machine learning and AI to enhance the security and privacy
Cyber security and privacy, and standardization, the compliance, and forensics
Moving target defensing, image, and target detection
Cyber Data and Analytics,
The Big data algorithms, models, and systems for the Big data
AI, Neural Network, Deep Learning
The Machine learning, and big data architecture and analytics
Big data, software design, middleware, and analytics
High - performance computing, and intensive data networks
Massive data streaming, scalable computing, big data task deployments
Cloud and high - performance computing for big data
The Data retrieval, storage, query, communications, and the database
The Data preservation, filter, provenance, and assurance
The Data the security, protection, integrity and privacy standards, and policies
Graph mining, and opinion mining,, and distributed data mining,
Data streaming, multimedia, stream, or web mining,
Social media and Social network analytics
The Security and information assurance for Big Data