...Cyber Security Assessment, Risk Management, Training Technologies and Data Analytics
...t, cyber risk management, cyber training technologies, cyber security data analytics
...
514 bytes (63 words) - 18:31, 1 June 2016
|Title=2017 IEEE International Conference on Intelligence and Security Informatics
|Field=Computer security and reliability
...
4 KB (429 words) - 06:55, 1 August 2019
* Algorithms for information security and privacy
* Algorithms for big data
...
4 KB (436 words) - 10:06, 25 August 2020
|Title=IEEE International Conference on Big Data
* Big Data Science and Foundations
...
5 KB (543 words) - 19:14, 18 May 2020
|Title=2019 IEEE International Conference on Intelligence and Security Informatics
|Field=Computer security and reliability
...
5 KB (575 words) - 08:16, 1 August 2019
cloud computing, big data, pervasive computing, Internet of Things, and social
cyber-physical systems. Enabling a smart life has become a popular research
...
3 KB (412 words) - 09:51, 3 September 2017
|Title=22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining
..., PAKDD’18 welcomes all submissions on all aspects of knowledge discovery, data mining and machine learning. Suggestive topics of relevance for the confere
...
2 KB (272 words) - 19:17, 20 May 2020
|Title=IEEE International Conference on Big Data
* 1. Big Data Science and Foundations
...
4 KB (563 words) - 13:55, 23 June 2020
|Title=24th Pacific-Asia Conference on Knowledge Discovery and Data Mining
* Anomaly detection and analytics
...
2 KB (261 words) - 18:06, 20 May 2020
|Title=23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining
...eory, practice, and applications on all aspects of knowledge discovery and data mining. Topics of relevance for the conference include, but not limited to,
...
2 KB (268 words) - 18:28, 20 May 2020
- The role of Software Architecture in the engineering and testing of data analytics software systems (AKA BigData);
- Developing the cybersecurity analytics framework in the context of BigData;
...
1 KB (187 words) - 19:13, 12 July 2020
* Data modeling, mining and data analytics
* Data modeling, aggregation, integration, and transformation
...
4 KB (490 words) - 07:38, 23 April 2020
* Advanced Analytics
* Big Data
...
2 KB (239 words) - 12:17, 2 June 2020
...processing, event processing in big and fast data, data stream processing, security and encryption in stream processing, complex event forecasting, in-network
...t processing, information-centric networking, software-defined networking, security, reliability and resilience, distributed ledger and blockchains, programmab
...
2 KB (300 words) - 14:01, 29 January 2021
...r digital transformation, but are also responsible by considering privacy, security, and ethical concerns and providing trustworthiness.
* Customer analytics
...
3 KB (375 words) - 13:06, 24 September 2020
|Title=BDCAT 2017 : The 4th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies
|Field=data mining
...
4 KB (583 words) - 08:01, 3 September 2017
...ion of distributed and event-based systems in relevant domains such as Big Data, AI/ML, IoT, and Blockchain. The objectives of the ACM International Confer
...rocessing in big and fast data, publish/subscribe, data stream processing, security and encryption in stream processing, rule-based systems, maintenance of mat
...
3 KB (344 words) - 13:54, 29 January 2021
* Data modeling, mining and data analytics
* Data modeling, aggregation, integration, and transformation
...
5 KB (608 words) - 11:03, 15 April 2020
Big data and machine learning for networks
Business Analytics and Big Data
...
2 KB (240 words) - 07:51, 13 April 2021
|Field=security
emerging topics pertaining to IoT and Big Data Analytics, High Speed
...
6 KB (743 words) - 09:45, 8 August 2017