SPECIAL SESSION ON Cyber Intelligence Attack Detections using Data Science Techniques in Internet of Things and Unmanned Aerial Vehicles

SPECIAL SESSION ON

Cyber Intelligence Attack Detections using Data Science Techniques in Internet of Things and Unmanned Aerial Vehicles

SESSION ORGANIZERS

EDITORIAL BOARD

  • Shahnaz Khademizadeh, Shahid Chamran University of Ahvaz, Iran
  • Sabitha Banu A, PSGR Krishnammal College for Women, India
  • Sugandima Mihirani Vidanagamachchi, University of Ruhuna, Sri Lanka
  • Shipra Shivkumar Yadav, Marwadi University, Rajkot Gujrat, India

SESSION DESCRIPTION

Every day, sensors and IoT devices produce enormous amount of data. In order to create systems that effectively gather, store and process this data. Data Science is a prerequisite. The data should be cleaned, filtered and pre-processed using machine learning methods to make sure that only pertinent information is examined. Attacks against IoT devices frequently start in the communication channels that link the various IoT components. IoT systems frequently use protocols that have security issues that could compromise the system as a whole. Additionally susceptible to network threats like DOS and Spoofing over IoT system. Establishing unmanned aerial vehicle (UAV) technology is evolving quickly, thus protecting the security and integrity of these autonomous systems is crucial. Unauthorized access, control and manipulation of UAV systems can result in cyber-attacks which could endanger user safety. In addition, UAVs face constraints in terms of computer power, physical and wireless communication weakness, dynamic threats and tactics, regulatory compliance requirements, and human consideration.

RECOMMENDED TOPICS

Topics to be discussed in this special session include (but are not limited to) the following:

  • Data Science in Routing and Communication among IoT devices.
  • Artificial Intelligence and Deep Learning in IoT, UAVs and Smart Environment.
  • Machine and Deep Learning in Securing UAVs, IoT and Smart Environment.
  • Cyber Threats and Intelligence using Data Science Techniques.
  • Blockchain and Federated Learning in IoT, Smart Environment and UAVs.

SUBMISSION PROCEDURE

Researchers and practitioners are invited to submit papers for this special theme session on Cyber Intelligence Attack Detections using Data Science Techniques in Internet of Things and Unmanned Aerial Vehicles on or before August 30th, 2024.

All submissions must be original and may not be under review by another publication.

 

All papers should be submitted

electronically through the easychair submission system as mentioned below:

The paper prior to submission should be checked for plagiarism from licensed plagiarism softwares like Turnitin/iAuthenticate etc. The similarity content should not exceed 20%.

 

INTERESTED AUTHORS SHOULD CONSULT THE CONFERENCE’S GUIDELINES FOR MANUSCRIPT SUBMISSIONS at https://icactce-conf.com/call-for-papers-2/.

 

All submitted papers will be reviewed on a double-blind, peer review basis.

All the accepted papers (after double blinded peer review) will be published within the ICACTCE’24 Proceedings (SCOPUS Indexed).

NOTE: While submitting paper in this special session, please specify Cyber Intelligence Attack Detections using Data Science Techniques in Internet of Things and Unmanned Aerial Vehicles at the top (above paper title) of the first page of your paper.