活动简介

Current continuously increasing demands of cloud computing and relevant network-based techniques have driven a dramatical growth of the implementations of data mining, smart data, artifical intelligence, and data analysis in multiple domains. Security and privacy issues in big data have become a great concern due to the interconnecting environment. IEEE BigDataSecurity 2018 addresses this domain and aims to gather recent academic achievements in this field. 

Moreover, cloud computing is the second concentration of IEEE BigDataSecurity 2018. The emerging mechanism of cloud computing has provided a variety of novel approaches addressing the solutions of big data. The new methods deriving from cloud computing have covered distinct dimensions, such as edge/fog computing, energy consumptions, high performance, and heterogeneous resources, cloud models, heterogeneous architecture, tele-health, resource allocation, load balance, multimedia, and QoS, etc. 

征稿信息

重要日期

2017-12-01
初稿截稿日期
2018-02-15
初稿录用日期
2018-03-15
终稿截稿日期

Current continuously increasing demands of cloud computing and relevant network-based techniques have driven a dramatical growth of the implementations of data mining, smart data, artifical intelligence, and data analysis in multiple domains. Security and privacy issues in big data have become a great concern due to the interconnecting environment. IEEE BigDataSecurity 2018 addresses this domain and aims to gather recent academic achievements in this field. 

Moreover, cloud computing is the second concentration of IEEE BigDataSecurity 2018. The emerging mechanism of cloud computing has provided a variety of novel approaches addressing the solutions of big data. The new methods deriving from cloud computing have covered distinct dimensions, such as edge/fog computing, energy consumptions, high performance, and heterogeneous resources, cloud models, heterogeneous architecture, tele-health, resource allocation, load balance, multimedia, and QoS, etc. 

  • Novel big data model
  • Big data security issues in cloud computing
  • Big data privacy in cloud computing
  • Big data storage, integration, service, mining
  • Big data security applications
  • Cyber hacking, next generation fire wall
  • Cyber monitoring, incident response
  • Database security, data center security
  • Social engineering, insider threats, advance spear phishing
  • Cyber threat intelligence
  • Security and fault tolerance for embedded or ubiquitous systems
  • Tele-health security in cloud computing
  • Sensor network security in cloud computing
  • Security policy and legal considerations
  • Cloud and networking security
  • Cloud computing and networking models
  • Virtualization for big data on cloud
  • MapReduce with cloud for big data processing
  • Heterogeneous architecture for cloud computing
  • Dynamic resource sharing algorithm for cloud computing
  • Load balance for cloud computing
  • Mobile cloud computing
  • Mobile commerce security and privacy
  • Green cloud computing
  • Embedded networks and sensor network optimizations
  • Cyber Security in emergent technologies
留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    05月03日

    2018

    05月05日

    2018

  • 12月01日 2017

    初稿截稿日期

  • 02月15日 2018

    初稿录用通知日期

  • 03月15日 2018

    终稿截稿日期

  • 05月05日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询