posted by user: dbrawat || 4030 views || tracked by 6 users: [display]

BigCPS-Security 2017 : Recent Advances in Big Data Analytics and Cyber-physical Systems Security

FacebookTwitterLinkedInGoogle

Link: http://digital-library.theiet.org/files/IET_CFP_CPS_BIG_DATA.pdf
 
When Dec 20, 2016 - Dec 20, 2017
Where UK
Submission Deadline Dec 20, 2016
Notification Due Feb 20, 0201
Final Version Due Apr 20, 0201
Categories    big data analytics   cps securit   cyber physical systems   cyber security
 

Call For Papers

Recent advancement in technologies for computing, communications and control provides opportunities to bridge physical components or processes with cyber-space leading to Cyber Physical Systems (CPS) in the Internet-of-Things (IoT) era. The basic
notion of CPS is to use computing (sensing, data analytics, predicting, understanding, etc.), communication (interaction, intervention, interface management, etc.) and control (automation, validation, interoperation, etc.) to make intelligent and autonomous systems. Such CPS systems are playing increasingly prevalent and important roles in the IoT era such as in transportation, manufacturing, aerospace, entertainment and many automated physical systems. Big data analytics and security are major components for resilient CPS. Efficient approaches for processing big data will not only enhance CPS themselves but also the processing, analysis and management of CPS big data for making real-time decisions. However, there are many issues and hurdles for big data analytics and CPS security that need discussion.

The goal of this special issue is to provide a platform for researchers and practitioners from academia, government and industry to present their research results in the area of big data analytics and CPS security. Submissions should present novel algorithms, tools, architectures, protocols, theories, and technologies for big data analytics and CPS security.

Topics of interest include but are not limited to:

- Big data analytics for CPS and IoT real-time control
- Secure CPS and IoT architectures
- Data acquisition, analysis and mining for CPS
- Cloud-integrated CPS and IoT
- Security and privacy i- CPS
- Cloud-integrated industrial CPS
- Opportunistic spectrum access CPS
- Modeling, simulations and validatio- of CPS
- Virtualizatio- of physical components i- cloud-CPS
- Tools and methods for big data analytics for CPS
- Fog computing for big data analytics and CPS security
- Cloud computing for big data analytics and CPS security
- Sensor-actuator networks for CPS
- Big data analytics and CPS security for mobile CPS
- Networked social networks and CPS
- Game theory for CPS security
- Hardware-supported trustworthy CPS platforms


For enquirers regarding this Special Issue please contact the Guest Editors:

Min Song, Michigan Technological University,Michigan, USA
E-mail: mins@mtu.edu

Danda B. Rawat, Howard University, Washington, DC, USA
E-mail: db.rawat@ieee.org

Jianli Zhao, Shandong University of Science and Technology,China
E-mail: zhaojianli@gmail.com

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICCCBDA 2026   IEEE--2026 the 11th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2026)
PRICAI 2025   22nd Pacific Rim International Conference on Artificial Intelligence
IEEE ICCCBDA 2026   IEEE--2026 the 11th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA 2026)
IEEE-AIEA 2025   2025 6th International Conference on Artificial Intelligence and Electromechanical Automation-IEEE Xplore/EI/Scopus
UVS-Oman 2026   3rd International Conference on Unmanned Vehicle Systems on Intelligent Systems for Industrial Challenges
EI/Scopus-EKI 2025   2025 3rd International Conference on Educational Knowledge and Informatization-EI/Scopus
ICINT 2026   2026 11th International Conference on Information and Network Technologies (ICINT 2026)
Ei/Scopus-CCNML 2025   2025 5th International Conference on Communications, Networking and Machine Learning (CCNML 2025)
NCS 2025   17th International Conference on Network and Communications Security