ICC3 2021: 5th International Conference on Computational Intelligence, Cyber security, Computational models PSG College of Technology Coimbatore, India, December 16-18, 2021 |
Conference website | http://www.psgtech.edu/icc3-2021/ |
Submission link | https://easychair.org/conferences/?conf=icc32021 |
Abstract registration deadline | August 10, 2021 |
Submission deadline | August 10, 2021 |
Notification of Acceptance | September 20, 2021 |
Camera Ready Paper Submission | September 30, 2021 |
We enthusiastically encourage prospective authors to submit an electronic version of their original research papers that contain contributions of theoretical, experimental or application nature using EasyChair.
The conference is organized in three tracks Computational Intelligence,Cybersecurity and Computational Models with the theme "Recent Trends in Computational Models, Intelligence and Security Systems" and will feature distinguished invited speakers in each track.
Computational Models
Computational Modelling formulates and models real-world problems, then uses computing to develop solutions Computational models have an influential role in developing and understanding complex systems with the support of mathematics, physics and computer simulation. Computational models help various stakeholders of the system to visualize, predict, optimize, regulate and control complex systems using high-end computing technology. Computational models evolve over time, as abstractions are introduced to eliminate unnecessary details and clarify the important design. Computational modelling and simulation methods can be developed for a vast range of science and engineering disciplines and far beyond.
Computational Intelligence
Computational Intelligence is a set of nature inspired computational methodologies and techniques to address complex real world problems. It encompasses neural networks, fuzzy logic and evolutionary computation as its main key elements. It is an evolving field and many computing paradigms including ambient intelligence, cultural learning and deep learning constitute the main core of computational intelligence. The aim of computational intelligence is to develop a new arena for analyzing and creating effective processing elements with adequate knowledge on sensing, interpreting, learning, thinking and remembering to aid intuitive information processing systems.
CyberSecurity
Cyber Security is becoming an increasingly central facet of national security strategy and a lot of people are working collectively in the field of Cyber Security. Both the private and public sectors are relying on cybersecurity. Securing network and information systems are essential to keeping the online economy in shape and to ensure progress. The rise of new technologies and changing norms of remote working are increasingly opening a Pandora's Box of critical infrastructure vulnerabilities. Being aware of potential cybersecurity threats, building a threat-resistant and agile infrastructure and adoption of best practices to mitigate operational hiccups and security risks are the most pertinent needs of every application sector. Security for Cyber Physical Systems, Networking protocols, Botnets and Malware, Intrusion detection, Data privacy, Authentication and Cryptanalysis are the core research areas in the field of cyber security.
Developing models of computation with intelligence and security form a basis of the theory of computational methods. Hence, the three areas namely computational intelligence, computational models and cyber security become inter-related under the umbrella of computational methods.
Papers are solicited from industry, government and academia (including students) covering relevant research, technologies, methodologies, tools and case studies. The aim of this conference series is to bring to the front the novel ideas in the theory and progress of cybersecurity, computational advancement for modelling and intelligence inorder to achieve a major breakthrough, practical improvements and new research directions. The topics listed below are meant to indicate the breadth of the area and are definitely not to be considered exhaustive.
Track 1: Computational Intelligence
-
Bioinfomatics
-
Computer Vision
-
Data Mining
-
Decision Support Systems
-
Evolutionary Computation
-
Formal language
-
Fuzzy Systems
-
Human-Computer Interaction
-
Information Retreival
-
Machine Learning
-
Natural Language Processing
-
Nature and Bio inspired Computing
-
Neural Networks
-
Pattern Recognition
Track 2: Cyber Security
-
Applied Cryptography
-
Authentication and Data Privacy
-
Cryptanalysis
-
Cloud / Web / Wireless Security
-
Data and Application Security
-
Digital Rights Management
-
Digital Forensics
-
Formal Methods in security
-
Intrusion Detection/Prevention
-
Information Security in IoT
-
Malware and Botnets
-
Mobile System Security
-
Security Protocols
-
Security for Smart Grid Communication
-
Security of Cyber-Physical Systems
-
Trustworthy Data Collection in IoT
Track 3: Computational Models
-
Combinatorial Optimization
-
Complex network models
-
Computational Geometry
-
Convex optimization
-
Cloud Computing
-
Database Models
-
Deep Learning Models
-
Digital Topology
-
Graph Models
-
Membrane Computing
- Predictive Computing
-
Quantum Computing
-
Stochastic Models
-
Theory of Computation
Papers submitted in English will be reviewed.
Only Adobe Portable Document Format (PDF) will be accepted for submission and review. Other formats will automatically be rejected by the EasyChair.
Authors are kindly requested to make sure that all equations, tables and figures are embedded in the PDF file.
Please submit your paper only through EasyChair.