CyberC promotes the in-depth exploration of the most recent research and development findings in the field of big data, distributed computing, clouds, cyber security, pervasive computing, mobile computing, Internet of Things, and other cyber-relevant technologies. CyberC welcomes the participation of the industry to showcase and commercialize their relevant technology and products. Scientists, engineers, and students in the areas are encouraged to get involved. You are cordially to submit your original papers in the following topics, but not limited to:


Cyber network and cybersecurity

    Cyber network, configuration, cloud, IoT, and wireless communications
    DDoS, Ransomware, and cybersecurity attacks and detection
    Multistage attacks, data security, AI and intrusion detection
    Risk assessment, management, and network monitoring
    Authentication and access Control
    Learning model for attack behavior, prediction, and game theory
    IoT and security
    Deploying machine learning and AI to enhance security and privacy
    Cybersafety and privacy
    Blockchain theory and its applications (smart grid, healthcare, ICS, etc.)
    Deploying machine learning and AI to enhance security and privacy
    Cybersafety and privacy, standardization, compliance, and forensics
    Moving target defensing, image, and target detection

Cyber Data and Analytics

    Big data algorithms, models, and systems for big data
    AI, Neural Network, Deep Learning
    Machine learning, and big data architecture and analytics
    Big data software design, middleware and analytics
    High-performance computing, and intensive data networks
    Massive data streaming, scalable computing, big data task deployments
    Cloud and high-performance computing for big data
    Data retrieval, storage, query, communications, and database
    Data preservation, filter, provenance, and assurance
    Data security, protection, integrity and privacy standards and policies
    Graph mining and opinion mining, and distributed data mining
    Data streaming, multimedia, stream, or web mining
    Image/multimedia data management
    Social media and social network analytics
    Security and information assurance for Big Data

Cyber and Distributed Computing

    Authentication, trust, privacy and other Cybersecurity issues
    Parallel and distributed algorithms, resource allocation, and load-balance
    Cloud computing, mobile cloud, mobility-aware cloud data/streams
    SOA, web services, and mobile services (software, infrastructure)
    Web services and internet computing
    Web-caching, content delivery systems, and data distribution systems
    Distributed applications, modeling language, and software engineering
    Pervasive/ubiquitous computing and intelligence

5G and Mobile Computing

    Wireless networks, mesh networks, MIMO and 5G
    Industry control network, networking theory and algorithms
    Wireless embedded sensor systems, body sensor, smart cities & security
    Cognitive radio and SDR
    Future generation communications and pervasive computing
    Peer-to-peer network computing and overlaying networks
    Directional antenna and networking
    FDMA/OFDMA modulations, synchronization, and power optimization
    Mobile IP and Internet technology
    Key, attacking models, privacy, confidentiality & security in mobile networks
    Communication, services, middleware, and multimedia on wireless networks
    QoS, reliability, performance, and communication theory
    Wireless network simulations, implementation, and applications

Cyber Computing and Clouds

    Autonomic, real-time and self-organizing clouds
    Architectural models for public and private cloud computing
    Cloud resource management and allocation
    Utility models and service pricing
    New parallel / concurrent programming models for cloud computing
    Scientific computation and other applications in the cloud
    Mobility modeling, management and measurement for mobile clouds
    Mobile multimedia content delivery, transferring, and migration
    Content delivery networks using storage clouds
    User Experience and Cyber Security
    Performance evaluation, measurement and optimization
    Communications and network security
    Information security, software security, system security, or cryptography
    Tools, test-bed, simulations, and experimental environments
    Collaborative and cooperative environments
    QoS, Autonomic, reliability, and fault-tolerance