HIASCIT 2025 - 10th International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2025) :: Luxembourg, Grand Duchy of Luxembourg :: July 29 – 31, 2025
Date2025-07-29 - 2025-07-31
Deadline2025-05-24
VenueLuxembourg, Luxembourg 
KeywordsInformation; Architecture; ICT; Security; Cloud; Programming; Business; Social; Behaviour
Topics/Call fo Papers
::::: Information Architecture
- Cloud Computing for Service Oriented Architectures
- Cloud Computing Infrastructure
- Cloud Computing Models, Techniques and Architecture
- Information Architecture Design for Cloud Computing and Security
- Library Systems and Database Development for Information Architecture
- Usability Engineering and Communicability for Information Architecture
::::: Security
- Administration Security Policy
- Data Privacy and Security
- Human Factors: Methods for the Elimination of Gardunia
- Security Certification: Standardization and Guidelines
- Security in Grid
- Security Policies and User Behaviour
- Semantic Computing and Security
::::: Cloud Intelligent
- Cloud Computing for Big Data
- Cloud Computing for Internet of Things
- Cloud Development Tools and Applications
- Federated Database System and Cloud Computing
- Mobile Cloud for Industrial Production and Business
- Strategies for Cloud Assessment
::::: Technology
- Advanced Multi-modal Interfaces for Security
- Authentication Mechanisms and Systems
- Cyber Security Automation
- Firewall Systems and Management
- ICT, Servers and Networking: Hardware and Software Configuration
- Multimedia Mobile Phone for Business Intelligence
- Network Security Issues and Protocols
- Voice, Face and Signature Recognition Systems for Security
::::: Programming
- Cloud Programming Models and Paradigms
- Database: Design, Security and Authorization
- Interactive Design with AI for International Users Security and Privacy Information
- Special Algorithms for Optimization Security, Cloud Computing Information and AI
- Theory and Applications of of Cryptology
- Vulnerability Analysis
::::: Software Quality
- Attack Information: Analysis for Detection and Prevention
- Heuristic Evaluation for Cyber Attacks with AI
- Human and Social Factors in Software Engineering for Security and Confidential Information
- Interactive Design for International Users Security and Privacy Information
- Natural Interfaces, Communicability and Strong Security for Interactive Systems
- Open Software and Commercial Software for Anti-virus
- Techniques and Methodologies for Virtual Defense
::::: Online Communities
- Access to Online Information: Rights and Obligations
- Consequences of the Cyber Destruction and International Legislation
- Digital Contents and Copyright Protection Techniques
- Ethics and Aesthetics of the Interactive Contents Online and Off-line
- Evaluation of the Impact of Security Efficiency on User Satisfaction
- Freedom of Thought and Expression: Hacking Democracy
- Information Society and International Legislation for New Technologies
::::: Cyber Behaviour
- Illegal Algorithms for the Censorship and Reputation Destruction
- Cyber Destructors and Parochialism from Education / Religion / Political / Legal Areas
- Intellectual Property and Copyright
- Methods and Techniques for Stopping Attacks in Social Networking
- Psychiatry Studies for Cyber Destructors
- Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
- Social Psychology and Human Behaviour in Safety, Security and Privacy
::::: Business
- Business and Security Risk Models
- Business Intelligence and Business Analytics
- Business Quality Models for Universities, Enterprises and Industries
- Communicability for Business Intelligence
- Mobile Cloud for Industrial Production and Business
- Security, Trust and Privacy in Commerce Online
- Cloud Computing for Service Oriented Architectures
- Cloud Computing Infrastructure
- Cloud Computing Models, Techniques and Architecture
- Information Architecture Design for Cloud Computing and Security
- Library Systems and Database Development for Information Architecture
- Usability Engineering and Communicability for Information Architecture
::::: Security
- Administration Security Policy
- Data Privacy and Security
- Human Factors: Methods for the Elimination of Gardunia
- Security Certification: Standardization and Guidelines
- Security in Grid
- Security Policies and User Behaviour
- Semantic Computing and Security
::::: Cloud Intelligent
- Cloud Computing for Big Data
- Cloud Computing for Internet of Things
- Cloud Development Tools and Applications
- Federated Database System and Cloud Computing
- Mobile Cloud for Industrial Production and Business
- Strategies for Cloud Assessment
::::: Technology
- Advanced Multi-modal Interfaces for Security
- Authentication Mechanisms and Systems
- Cyber Security Automation
- Firewall Systems and Management
- ICT, Servers and Networking: Hardware and Software Configuration
- Multimedia Mobile Phone for Business Intelligence
- Network Security Issues and Protocols
- Voice, Face and Signature Recognition Systems for Security
::::: Programming
- Cloud Programming Models and Paradigms
- Database: Design, Security and Authorization
- Interactive Design with AI for International Users Security and Privacy Information
- Special Algorithms for Optimization Security, Cloud Computing Information and AI
- Theory and Applications of of Cryptology
- Vulnerability Analysis
::::: Software Quality
- Attack Information: Analysis for Detection and Prevention
- Heuristic Evaluation for Cyber Attacks with AI
- Human and Social Factors in Software Engineering for Security and Confidential Information
- Interactive Design for International Users Security and Privacy Information
- Natural Interfaces, Communicability and Strong Security for Interactive Systems
- Open Software and Commercial Software for Anti-virus
- Techniques and Methodologies for Virtual Defense
::::: Online Communities
- Access to Online Information: Rights and Obligations
- Consequences of the Cyber Destruction and International Legislation
- Digital Contents and Copyright Protection Techniques
- Ethics and Aesthetics of the Interactive Contents Online and Off-line
- Evaluation of the Impact of Security Efficiency on User Satisfaction
- Freedom of Thought and Expression: Hacking Democracy
- Information Society and International Legislation for New Technologies
::::: Cyber Behaviour
- Illegal Algorithms for the Censorship and Reputation Destruction
- Cyber Destructors and Parochialism from Education / Religion / Political / Legal Areas
- Intellectual Property and Copyright
- Methods and Techniques for Stopping Attacks in Social Networking
- Psychiatry Studies for Cyber Destructors
- Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
- Social Psychology and Human Behaviour in Safety, Security and Privacy
::::: Business
- Business and Security Risk Models
- Business Intelligence and Business Analytics
- Business Quality Models for Universities, Enterprises and Industries
- Communicability for Business Intelligence
- Mobile Cloud for Industrial Production and Business
- Security, Trust and Privacy in Commerce Online
Other CFPs
- 5th International Conference on Innovation in Tourism Systems, Intelligent Gamification and User Interaction (ITSIGUI 2025) :: Ljubljana, Slovenia :: 13 - 15 June 2025
- 14th International Symposium on COMMUNICABILITY, COMPUTER GRAPHICS AND INNOVATIVE DESIGN FOR INTERACTIVE SYSTEMS (CCGIDIS 2025) :: Ljubljana, Slovenia :: June 10 – 12, 2025
- 11th International Conference on Multimedia, Scientific Information, and Visualization for Information Systems and Metrics (MSIVISM 2025) :: London – UK :: May 22 – 24, 2025
- 13th International Conference on Software and Emerging Technologies for Education, Culture, Entertainment, and Commerce (SETECEC 2025) :: London – UK :: May 20 – 22, 2025
- The 12th International Conference on Agriculture 2025 (AGRICO 2025)
Last modified: 2025-05-06 13:05:25
Share Your Research, Maximize Your Social Impacts

