ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CTISRM 2016 - International Conference on Computing Technology, Information Security and Risk Management

Date2016-03-03 - 2016-03-05

Deadline2015-06-30

VenueDubai, UAE - United Arab Emirates UAE - United Arab Emirates

Keywords

Websitehttps://sdiwc.net/conferences/ctisrm2016

Topics/Call fo Papers

The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016) that will be held in Dubai, UAE, on March 3-5, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics:
Computing Technology
Face Recognition and High-Resolution Imaging Object Detection, Recognition and Categorization
Adaptive Signal Processing Parallel Programming & Processing
Coding and Modulation Mobile IP Networks/ Ad-hoc Networks
Image Processing Data Modeling for Cloud-Based Networks
Artificial Intelligence Expert Systems
Modulation, Coding, and Channel Analysis Multimedia Signal Processing
Video Compression and Streaming Data Mining for Social Network Analysis
Mobile/ Wireless Network Modeling and Simulation Data Compression and Watermarking
Speech Recognition, Analysis and Synthesis Energy Minimization in Cluster-Based Wireless Sensor Networks
Data Cleaning and Processing Text and Web Mining
Bluetooth and Personal Area Networks Wireless System Architecture
Wireless Network Standard and Protocols Digital Right Management and Multimedia Protection
Mobile Management in Wireless Networks Mobile Database Access and Design
Information Security
Multimedia and Document Security Operating System and Database Security
Enterprise System Security Hardware-Based Security
Social Network Security Wireless and Local Area Networks Security
Network and Cyber Security Information Content Security
Voice Over IP Security Wireless Communication Security
E-Commerce Security Computer Forensics
Security in Cloud Computing Security In Data Center
Security of Web-Based Application and Services Threat, Vulnerability, and Risk Management
Cryptography and Data Protection Computer Crime Prevention and Detection
Surveillance Systems Security Policies and Trust Managements
Risk Management
Risk Handling Strategies Practical Risk Management
Risk Management of Financial Information Risk Transfer Strategies
Resource Risk Management Risk Management of IT
Risk Management of Natural Disasters Enterprise Risk Management
Medical Device Risk Management Risk Management in Petroleum and Gas
Security Risk Management Risk Management Techniques for Active Trades
Risk Management and Critical Infrastructure Protection Operational Risk Management
Risk Management in Banking Industry Investment Risk Management
Event Identification, Risk Assessment, and Risk response Risk Tolerance Evaluation Techniques
All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.
All Papers submitted will be reviewed by a minimum of two reviewers. The published proceedings will be indexed by at least five or more of the following: DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Academic Research, ResearchGate, and Google Scholar Databases. In addition, best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor:
IJNCAA
International Journal of New Computer Architectures and their Applications (IJNCAA)
IJDIWC
International Journal of Digital Information and Wireless Communications (IJDIWC)
IJCSDF
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
IJEETDM
International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM)

Last modified: 2015-06-05 22:43:30