CyberC promotes the in-depth exploration of the most recent research and development findings in the field of big data, distributed computing, clouds, cyber security, pervasive computing, mobile computing, Internet of Things, and other cyber-relevant technologies. CyberC welcomes the participation of the industry to showcase and commercialize their relevant technology and products. Scientists, engineers, and students in the areas are encouraged to get involved. You are cordially to submit your original papers in the following topics, but not limited to:
Cyber network and cybersecurity
-
Cyber network, configuration, cloud, IoT, and wireless communications
DDoS, Ransomware, and cybersecurity attacks and detection
Multistage attacks, data security, AI and intrusion detection
Risk assessment, management, and network monitoring
Authentication and access Control
Learning model for attack behavior, prediction, and game theory
IoT and security
Deploying machine learning and AI to enhance security and privacy
Cybersafety and privacy
Blockchain theory and its applications (smart grid, healthcare, ICS, etc.)
Deploying machine learning and AI to enhance security and privacy
Cybersafety and privacy, standardization, compliance, and forensics
Moving target defensing, image, and target detection
Cyber Data and Analytics
-
Big data algorithms, models, and systems for big data
AI, Neural Network, Deep Learning
Machine learning, and big data architecture and analytics
Big data software design, middleware and analytics
High-performance computing, and intensive data networks
Massive data streaming, scalable computing, big data task deployments
Cloud and high-performance computing for big data
Data retrieval, storage, query, communications, and database
Data preservation, filter, provenance, and assurance
Data security, protection, integrity and privacy standards and policies
Graph mining and opinion mining, and distributed data mining
Data streaming, multimedia, stream, or web mining
Image/multimedia data management
Social media and social network analytics
Security and information assurance for Big Data
Blockchain applications on edge computing, industry 4.0, IoT and smart cities
Edge computing and blockchain for industry
Edge computing and blockchain for Supply Chain Brain
Edge computing algorithms
Cyber and Distributed Computing
-
Authentication, trust, privacy and other Cybersecurity issues
Parallel and distributed algorithms, resource allocation, and load-balance
Cloud computing, mobile cloud, mobility-aware cloud data/streams
SOA, web services, and mobile services (software, infrastructure)
Web services and internet computing
Web-caching, content delivery systems, and data distribution systems
Distributed applications, modeling language, and software engineering
Pervasive/ubiquitous computing and intelligence
5G and Mobile Computing
-
Wireless networks, mesh networks, MIMO and 5G
Industry control network, networking theory and algorithms
Wireless embedded sensor systems, body sensor, smart cities & security
Cognitive radio and SDR
Future generation communications and pervasive computing
Peer-to-peer network computing and overlaying networks
Directional antenna and networking
FDMA/OFDMA modulations, synchronization, and power optimization
Mobile IP and Internet technology
Key, attacking models, privacy, confidentiality & security in mobile networks
Communication, services, middleware, and multimedia on wireless networks
QoS, reliability, performance, and communication theory
Wireless network simulations, implementation, and applications
Cyber Computing and Clouds
-
Autonomic, real-time and self-organizing clouds
Architectural models for public and private cloud computing
Cloud resource management and allocation
Utility models and service pricing
New parallel / concurrent programming models for cloud computing
Scientific computation and other applications in the cloud
Mobility modeling, management and measurement for mobile clouds
Mobile multimedia content delivery, transferring, and migration
Content delivery networks using storage clouds
User Experience and Cyber Security
Performance evaluation, measurement and optimization
Communications and network security
Information security, software security, system security, or cryptography
Tools, test-bed, simulations, and experimental environments
Collaborative and cooperative environments
QoS, Autonomic, reliability, and fault-tolerance