Información de la conferencia
BDCTA 2026: International Conference on Big Data, Communication Technology and Computer Applications
https://www.bdcta.org/Día de Entrega: |
2026-01-30 |
Fecha de Notificación: |
|
Fecha de Conferencia: |
2026-02-06 |
Ubicación: |
Harbin, China |
Años: |
2 |
Vistas: 4248 Seguidores: 0 Asistentes: 1
Solicitud de Artículos
2026 2nd International Conference on Big Data, Communication Technology and Computer Applications provides a premier forum for the presentation of new advances and research results in the fields of Computer Engineering and Application. The conference will bring together leading researchers, social workers and scientists in the domain of interest from around the world. The topics of interest for submission include, but are not limited to: ◕ Communication and Information Engineering · Ad hoc & sensor networks · Embedded networks · High-speed access networks · Home and SOHO networks · IPv6 deployment & migration · Local area networks · Optical networks · Overlay networks · Peer-to-peer networks · Personal and wearable networks · Routing and Scheduling · Storage area networks · Ubiquitous networking · Wireless networks · Multimedia & real-time communication · Network reliability and security · Network traffic characterization · Cross-layer Design and Optimization · Communication and Information Theory · Communication Software and Services · Protocol and Algorithms for Communications · Wireless Communications and Networking · Broadband Wireless Access · Cooperative Communications and Networking · Optical Communications and Networking · Broadband Networking and Protocols · Internet Services, Systems and Applications · P2P Communications and Networking · Pervasive Computing and Grid Networking ◕ Information and network security · Network Intrusion Detection and Prevention · Malware and botnets · Communication Privacy and Anonymity · Distributed denial of service · Web security · Information leakage · Information theft · Data tampering · Data deletion · computer virus · Security breach · Attack monitoring · Encrypted communication · Information dissemination safety · Network isolation · Application security · Email security · Network segmentation · Application security · Behavioral analytics · Cloud security · Intrusion prevention systems · Mobile device security · Wireless security
Última Actualización Por Dou Sun en 2026-01-16
Conferencias Relacionadas
Revistas Relacionadas
| CCF | Nombre Completo | Factor de Impacto | Editor | ISSN |
|---|---|---|---|---|
| c | Journal of Network and Computer Applications | 8.0 | Elsevier | 1084-8045 |
| b | ACM Transactions on Multimedia Computing, Communications and Applications | 6.0 | ACM | 1551-6857 |
| ACM Transactions on Multimedia Computing, Communications, and Applications | 6.0 | ACM | 1551-6857 | |
| Journal of Chemical Theory and Computation | 5.5 | American Chemical Society | 1549-9618 | |
| c | Journal of Information Security and Applications | 3.7 | Elsevier | 2214-2126 |
| Cognition, Technology & Work | 3.4 | Springer | 1435-5558 | |
| IET Control Theory & Applications | 2.6 | IET | 1751-8644 | |
| Journal of Optimization Theory and Applications | 1.5 | Springer | 0022-3239 | |
| Journal of Control Theory and Applications | 1.5 | Springer | 1672-6340 | |
| International Journal of Advanced Computer Science and Applications | 0.700 | Science and Information | 2158-107X |