• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Journals
  • /Bd
  • Home
  • / ...
  • /Journals
  • /Bd

CLOSED Call for Papers: Special Issue on Data Mining for Cyber-Physical Systems and Complex, Time-Evolving Networks

IEEE TBD seeks submissions for this upcoming special issue.

Important Dates

Submissions Due: 20 January, 2023

Publication: September 2023


Digital protection is a set of rules and innovations designed to protect our frameworks, organization, and information from unapproved access, assaults, and undesirable interferes. In recent years, several market leaders in the IT industry have begun to use data mining techniques for malware detection. They intend to keep up with the secrecy, respectability, and accessibility of data and the executive's frameworks through different digital safeguard frameworks. Because of the accessibility of a large amount of information in digital framework and expanding number of digital hoodlums, there is a need for abilities to address network safety.

Internet technology has made the industry more hidden in various ways; in any case, this has disconnected separated us by implications that have traditionally never been sincerely adaptive, thus testing. As rapidly as stability was advanced, there was the cyberattack's image. A variety of data affirmation obligations are required about errands, information, and resources from ongoing arising assaults.

The use of security risk can prevent a lot of digitally enhanced attacks, privacy invasion, and documentation misunderstandings while still helping the panel's threat. Whenever the organization grows an interpretation of coalition vigilance and a feasible contingency plan, it is easier to avoid and authenticate those very threats. A digital security detective promotes the security of the firm's paradigms and entities by planning and implementing our security measures. They provide troublesome responses to prevent relevant data from becoming taken, affected, or damaged. Moreover, tracking data exploitation investigates at least three linear models or repercussions. Communication data mining methods should be effective in combating these modifications. The use of evidence, mining algorithms have resulted in the establishment of a horrific quantity of knowledge that is far too large to purchase. Information is now becoming faster than our ability to process and sell actual data. The statistics must be limited as quickly as necessary to reach suitable data storage dimensions. Once knowledge or large amounts of data are recognized as the new daily investment of the era, the relevance of knowledge discovery and going to agree on techniques keeps increasing. Its fierce progression of effective methods us both to collect data hugely evaluated and sophisticated volumes of information. This special issue investigates the operability of data mining for cyber-physical systems and complex, time-evolving networks. Researchers are requested to describe emerging developments and advances in adopting time-evolving networks. Furthermore, there is a need to explore performance, metrics and challenges in data mining for cyber-physical systems and complex, time-evolving networks.

Topics of interest include (but are not limited to):

  • Empirical researchers on information mining frameworks
  • Multi-agent information extraction but also data deduplication oil and gas production
  • Multiple data digging with outstanding quality and web-based data resource extraction
  • Internet Of things implementations in the health care system would be examined under Cloud computing application domains
  • Statistical techniques are used in financial institutions through their financial services functionalities
  • Recent advances in deep learning and factual information mining techniques
  • The role of data mining in condition monitoring of high voltage electrical equipment
  • Strategies for the use of machine learning include reducing terrorist attacks
  • The role of Mining data for various biotic and abiotic negative issues
  • Arising patterns in network protection for The haze, suspicious messages, the sensor networks, and the dark web
  • Arising patterns in network protection for Machine intelligence, keyloggers, and procurement intrusions
  • Strategies for large amounts of data are excavated for exhibit, interpretation, and prospectus


Submission Guidelines

For author information and guidelines on submission criteria, please visit the TBD's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Email the guest editor at clindut@ieee.org

Guest Editors:

  • Dr. Chi Lin; Senior member of IEEE, ACM, and CCF, Associate Professor, Vice Advisor,Institute of Intelligent System, School of Software, Dalian University of Technology, Dalian, China
  • Dr. Chang Wu Yu; Professor, Department of Computer Science and Information, Engineering, Chung Hua University, Hsinchu, Taiwan
  • Dr. Ning Wang; Assistant Professor, Computer Science & Research, Rowan University, Glassboro, New Jersey, USA
  • Dr. Qiang Lin; Professor, Dalian University of Technology, Dalian, China.

LATEST NEWS
IEEE Computer Society Announces 2026 Class of Fellows
IEEE Computer Society Announces 2026 Class of Fellows
MicroLED Photonic Interconnects for AI Servers
MicroLED Photonic Interconnects for AI Servers
Vishkin Receives 2026 IEEE Computer Society Charles Babbage Award
Vishkin Receives 2026 IEEE Computer Society Charles Babbage Award
Empowering Communities Through Digital Literacy: Impact Across Lebanon
Empowering Communities Through Digital Literacy: Impact Across Lebanon
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
Read Next

IEEE Computer Society Announces 2026 Class of Fellows

MicroLED Photonic Interconnects for AI Servers

Vishkin Receives 2026 IEEE Computer Society Charles Babbage Award

Empowering Communities Through Digital Literacy: Impact Across Lebanon

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter