ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

HIASCIT 2026 - 11th International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology

Date2026-07-29 - 2026-07-31

Deadline2026-07-18

VenueLuxembourg, Luxembourg Luxembourg

KeywordsInformation; Architecture; ICT; Security; Cloud; Programming; Social; Business; Software; AI

Websitehttps://www.alaipo.com/hiascit-2026/conf...

Topics/Call fo Papers

:::: Information Architecture
- Cloud Computing for Service Oriented Architectures
- Cloud Computing Infrastructure
- Cloud Computing Models, Techniques and Architecture
- Information Architecture Design for Cloud Computing and Security
- Library Systems and Database Development for Information Architecture
- Usability Engineering and Communicability for Information Architecture
:::: Security
- Administration Security Policy
- Data Privacy and Security
- Human Factors: Methods for the Elimination of Gardunia
- Security Certification: Standardization and Guidelines
- Security in Grid
- Security Policies and User Behaviour
- Semantic Computing and Security
:::: Cloud Intelligent
- Cloud Computing for Big Data
- Cloud Computing for Internet of Things
- Cloud Development Tools and Applications
- Federated Database System and Cloud Computing
- Mobile Cloud for Industrial Production and Business
- Strategies for Cloud Assessment
:::: Technology
- Advanced Multi-modal Interfaces for Security
- Authentication Mechanisms and Systems
- Cyber Security Automation
- Firewall Systems and Management
- ICT, Servers and Networking: Hardware and Software Configuration
- Multimedia Mobile Phone for Business Intelligence
- Network Security Issues and Protocols
- Voice, Face and Signature Recognition Systems for Security
:::: Programming
- Cloud Programming Models and Paradigms
- Database: Design, Security and Authorization
- Interactive Design with AI for International Users Security and Privacy Information
- Special Algorithms for Optimization Security, Cloud Computing Information and AI
- Theory and Applications of of Cryptology
- Vulnerability Analysis
:::: Software Quality
- Attack Information: Analysis for Detection and Prevention
- Heuristic Evaluation for Cyber Attacks with AI
- Human and Social Factors in Software Engineering for Security and Confidential Information
- Interactive Design for International Users Security and Privacy Information
- Natural Interfaces, Communicability and Strong Security for Interactive Systems
- Open Software and Commercial Software for Anti-virus
- Techniques and Methodologies for Virtual Defense
:::: Online Communities
- Access to Online Information: Rights and Obligations
- Consequences of the Cyber Destruction and International Legislation
- Digital Contents and Copyright Protection Techniques
- Ethics and Aesthetics of the Interactive Contents Online and Off-line
- Evaluation of the Impact of Security Efficiency on User Satisfaction
- Freedom of Thought and Expression: Hacking Democracy
- Information Society and International Legislation for New Technologies
:::: Cyber Behaviour
- Illegal Algorithms for the Censorship and Reputation Destruction
- Cyber Destructors and Parochialism from Education / Religion / Political / Legal Areas
- Intellectual Property and Copyright
- Methods and Techniques for Stopping Attacks in Social Networking
- Psychiatry Studies for Cyber Destructors
- Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
- Social Psychology and Human Behaviour in Safety, Security and Privacy
:::: Business
- Business and Security Risk Models
- Business Intelligence and Business Analytics
- Business Quality Models for Universities, Enterprises and Industries
- Communicability for Business Intelligence
- Mobile Cloud for Industrial Production and Business
- Security, Trust and Privacy in Commerce Online

Last modified: 2025-11-22 02:12:17