Deployment Areas of Dynamic Environments (DADE) is categorized in our directory with the following tags: European Cybersecurity Conferences
Add this event to your calendar
Cybersecurity Conference Description [Submitted by Organizer/ Or Written By Us]
In real world a great majority of processes are time-dependant by nature. Therefore, methodologies of processing data and information in dynamic environments are widely studied. In particular, application areas like for instance in business, medicine, or smart cities are expanding rapidly such that the trend creates the challenge for research community to build new infrastructure aimed at meeting the innovative requirements.
One of the fundamental goals in computational intelligence is to achieve the ability to effective computer-assisted learning from noisy, uncertain and incomplete data in order to adapt to constantly changing environments. Examples of such dynamic environments, which require some well-defined and verified methods and tools, include Internet of Things networks and real-time systems. Substantial changes, concept drift and some newly emerging trends in dynamic environments can have an impact on the increasing number of imprecise predictive methods, the rate of false alarms and consequently it may influence the systems performance and/or security.
This Special Session is intended to provide a forum for researchers in this area to exchange new ideas. So that we encourage the research community to submit their work in progress, concept papers, position papers, case studies, reports, review papers to present innovative ideas that can provoke a discussion and provide a feedback to the session participants, initiate collaborations and stimulate some creative thinking about promising research trends.
Do You Have A Question Regarding This Event?
About Our Service
We've been listing Cybersecurity Conferences and InfoSec Events for the last seven years which is a VERY long time in cyberspace!
What started as a simple blog post in 2012 spawned into this mega directory which lists, literally, every single IT Security event that takes place around the world at any given time.
We hope you enjoy our resource, and as ever, we'd really appreciate it if you could link back to our site.