You are invited to participate in The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016) that will be held in Dubai, UAE, on March 3-5, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
| The conference welcomes papers on the following (but not limited to) research topics: | |
|---|---|
| Computing Technology | |
| Face Recognition and High-Resolution Imaging | Object Detection, Recognition and Categorization | 
| Adaptive Signal Processing | Parallel Programming & Processing | 
| Coding and Modulation | Mobile IP Networks/ Ad-hoc Networks | 
| Image Processing | Data Modeling for Cloud-Based Networks | 
| Artificial Intelligence | Expert Systems | 
| Modulation, Coding, and Channel Analysis | Multimedia Signal Processing | 
| Video Compression and Streaming | Data Mining for Social Network Analysis | 
| Mobile/ Wireless Network Modeling and Simulation | Data Compression and Watermarking | 
| Speech Recognition, Analysis and Synthesis | Energy Minimization in Cluster-Based Wireless Sensor Networks | 
| Data Cleaning and Processing | Text and Web Mining | 
| Bluetooth and Personal Area Networks | Wireless System Architecture | 
| Wireless Network Standard and Protocols | Digital Right Management and Multimedia Protection | 
| Mobile Management in Wireless Networks | Mobile Database Access and Design | 
| Information Security | |
| Multimedia and Document Security | Operating System and Database Security | 
| Enterprise System Security | Hardware-Based Security | 
| Social Network Security | Wireless and Local Area Networks Security | 
| Network and Cyber Security | Information Content Security | 
| Voice Over IP Security | Wireless Communication Security | 
| E-Commerce Security | Computer Forensics | 
| Security in Cloud Computing | Security In Data Center | 
| Security of Web-Based Application and Services | Threat, Vulnerability, and Risk Management | 
| Cryptography and Data Protection | Computer Crime Prevention and Detection | 
| Surveillance Systems | Security Policies and Trust Managements | 
| Risk Management | |
| Risk Handling Strategies | Practical Risk Management | 
| Risk Management of Financial Information | Risk Transfer Strategies | 
| Resource Risk Management | Risk Management of IT | 
| Risk Management of Natural Disasters | Enterprise Risk Management | 
| Medical Device Risk Management | Risk Management in Petroleum and Gas | 
| Security Risk Management | Risk Management Techniques for Active Trades | 
| Risk Management and Critical Infrastructure Protection | Operational Risk Management | 
| Risk Management in Banking Industry | Investment Risk Management | 
| Event Identification, Risk Assessment, and Risk response | Risk Tolerance Evaluation Techniques | 
All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.
03月03日
2016
03月05日
2016
初稿截稿日期
注册截止日期
留言