ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

CTISRM 2017 - The Second International Conference on Computing Technology, Information Security and Risk Management

Date2017-09-28 - 2017-09-30


VenueISGA Campus Marrakech, Rue Ibn Habbous, Marrakesh, Morocco Morocco

KeywordsComputing Technology; Information Security; Risk Management


Topics/Call fo Papers

Face Recognition and High-Resolution Imaging
Object Detection, Recognition and Categorization
Adaptive Signal Processing
Parallel Programming & Processing
Coding and Modulation
Mobile IP Networks/ Ad-hoc Networks
Image Processing
Data Modeling for Cloud-Based Networks
Artificial Intelligence Expert Systems
Modulation, Coding, and Channel Analysis
Multimedia Signal Processing
Video Compression and Streaming Data Mining for Social Network Analysis
Mobile/ Wireless Network Modeling and Simulation
Data Compression and Watermarking
Speech Recognition, Analysis and Synthesis
Energy Minimization in Cluster-Based Wireless Sensor Networks
Data Cleaning and Processing
Text and Web Mining
Bluetooth and Personal Area Networks
Wireless System Architecture
Wireless Network Standard and Protocols
Digital Right Management and Multimedia Protection
Mobile Management in Wireless Networks
Mobile Database Access and Design
Multimedia and Document Security
Operating System and Database Security
Enterprise System Security
Hardware-Based Security
Social Network Security Wireless and Local Area Networks Security
Network and Cyber Security
Information Content Security
Voice Over IP Security
Wireless Communication Security
E-Commerce Security Computer Forensics
Security in Cloud Computing Security In Data Center
Security of Web-Based Application and Services Threat, Vulnerability, and Risk Management
Cryptography and Data Protection
Computer Crime Prevention and Detection
Surveillance Systems
Security Policies and Trust Managements
Risk Handling Strategies
Practical Risk Management
Risk Management of Financial Information
Risk Transfer Strategies
Resource Risk Management
Risk Management of IT
Risk Management of Natural Disasters
Enterprise Risk Management
Medical Device Risk Management
Risk Management in Petroleum and Gas
Security Risk Management
Risk Management Techniques for Active Trades
Risk Management and Critical Infrastructure Protection
Operational Risk Management
Risk Management in Banking Industry Investment Risk Management
Event Identification, Risk Assessment, and Risk response
Risk Tolerance Evaluation Techniques
The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process. To facilitate this, authors need to ensure that their manuscripts are prepared in a way that does not give away their identity.

Last modified: 2017-01-26 15:27:33