You are invited to participate in The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016) that will be held in Dubai, UAE, on March 3-5, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
The conference welcomes papers on the following (but not limited to) research topics: | |
---|---|
Computing Technology | |
Face Recognition and High-Resolution Imaging | Object Detection, Recognition and Categorization |
Adaptive Signal Processing | Parallel Programming & Processing |
Coding and Modulation | Mobile IP Networks/ Ad-hoc Networks |
Image Processing | Data Modeling for Cloud-Based Networks |
Artificial Intelligence | Expert Systems |
Modulation, Coding, and Channel Analysis | Multimedia Signal Processing |
Video Compression and Streaming | Data Mining for Social Network Analysis |
Mobile/ Wireless Network Modeling and Simulation | Data Compression and Watermarking |
Speech Recognition, Analysis and Synthesis | Energy Minimization in Cluster-Based Wireless Sensor Networks |
Data Cleaning and Processing | Text and Web Mining |
Bluetooth and Personal Area Networks | Wireless System Architecture |
Wireless Network Standard and Protocols | Digital Right Management and Multimedia Protection |
Mobile Management in Wireless Networks | Mobile Database Access and Design |
Information Security | |
Multimedia and Document Security | Operating System and Database Security |
Enterprise System Security | Hardware-Based Security |
Social Network Security | Wireless and Local Area Networks Security |
Network and Cyber Security | Information Content Security |
Voice Over IP Security | Wireless Communication Security |
E-Commerce Security | Computer Forensics |
Security in Cloud Computing | Security In Data Center |
Security of Web-Based Application and Services | Threat, Vulnerability, and Risk Management |
Cryptography and Data Protection | Computer Crime Prevention and Detection |
Surveillance Systems | Security Policies and Trust Managements |
Risk Management | |
Risk Handling Strategies | Practical Risk Management |
Risk Management of Financial Information | Risk Transfer Strategies |
Resource Risk Management | Risk Management of IT |
Risk Management of Natural Disasters | Enterprise Risk Management |
Medical Device Risk Management | Risk Management in Petroleum and Gas |
Security Risk Management | Risk Management Techniques for Active Trades |
Risk Management and Critical Infrastructure Protection | Operational Risk Management |
Risk Management in Banking Industry | Investment Risk Management |
Event Identification, Risk Assessment, and Risk response | Risk Tolerance Evaluation Techniques |
All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.
03月03日
2016
03月05日
2016
初稿截稿日期
注册截止日期
留言