IEEE International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys)
Event submitted on Monday, June 8th 2020, approved by Charles Villanueva ✓
Stay Safe, Stay Strong and we'll see you on the other side. Your friends at InfoSec Conferences.
This event has been tagged as follows:
This is a physical InfoSec event taking place in beautiful Fiji, exploring big data and IoT, amongst other subject matter. We wish the organizers the best of luck with this rare Cybersecurity Conference in Fiji!
The following description was either submitted by the Conference Organizer on Monday, June 8th 2020, or created by us.Add this conference to your favourites
DependSys 2020 conference is the 6th event in the series of conferences that offers a timely venue for bringing together new ideas, techniques, and solutions for dependability and its issues in sensor, cloud, and big data systems and applications.
As we are deep into the Information Age, huge amounts of data are generated every day from sensors, individual archives, social networks, Internet of Things, enterprises, and the Internet in various scales and formats which will pose a major challenge to the dependability of our designed systems.
These systems often tend to become inert, fragile, and vulnerable after a period of running. Effectively improving the dependability of sensors, cloud, big data systems, and applications has become increasingly critical.
This conference provides a forum for individuals, academics, practitioners, and organizations who are developing or procuring sophisticated computer systems on whose dependability of services they need to place great confidence. Future systems need to close the dependability gap in the face of challenges in different circumstances.
The emphasis will be on differing properties of such services, e.g., continuity, effective performance, real-time responsiveness, ability to overcome data fault, corruption, anomaly, ability to avoid catastrophic failures, prevention of deliberate privacy intrusions, reliability, availability, sustainability, adaptability, heterogeneity, security, safety, and so on.