You are invited to participate in The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016) that will be held in Dubai, UAE, on March 3-5, 2016. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.
| The conference welcomes papers on the following (but not limited to) research topics: | |
|---|---|
| Computing Technology | |
| Face Recognition and High-Resolution Imaging | Object Detection, Recognition and Categorization |
| Adaptive Signal Processing | Parallel Programming & Processing |
| Coding and Modulation | Mobile IP Networks/ Ad-hoc Networks |
| Image Processing | Data Modeling for Cloud-Based Networks |
| Artificial Intelligence | Expert Systems |
| Modulation, Coding, and Channel Analysis | Multimedia Signal Processing |
| Video Compression and Streaming | Data Mining for Social Network Analysis |
| Mobile/ Wireless Network Modeling and Simulation | Data Compression and Watermarking |
| Speech Recognition, Analysis and Synthesis | Energy Minimization in Cluster-Based Wireless Sensor Networks |
| Data Cleaning and Processing | Text and Web Mining |
| Bluetooth and Personal Area Networks | Wireless System Architecture |
| Wireless Network Standard and Protocols | Digital Right Management and Multimedia Protection |
| Mobile Management in Wireless Networks | Mobile Database Access and Design |
| Information Security | |
| Multimedia and Document Security | Operating System and Database Security |
| Enterprise System Security | Hardware-Based Security |
| Social Network Security | Wireless and Local Area Networks Security |
| Network and Cyber Security | Information Content Security |
| Voice Over IP Security | Wireless Communication Security |
| E-Commerce Security | Computer Forensics |
| Security in Cloud Computing | Security In Data Center |
| Security of Web-Based Application and Services | Threat, Vulnerability, and Risk Management |
| Cryptography and Data Protection | Computer Crime Prevention and Detection |
| Surveillance Systems | Security Policies and Trust Managements |
| Risk Management | |
| Risk Handling Strategies | Practical Risk Management |
| Risk Management of Financial Information | Risk Transfer Strategies |
| Resource Risk Management | Risk Management of IT |
| Risk Management of Natural Disasters | Enterprise Risk Management |
| Medical Device Risk Management | Risk Management in Petroleum and Gas |
| Security Risk Management | Risk Management Techniques for Active Trades |
| Risk Management and Critical Infrastructure Protection | Operational Risk Management |
| Risk Management in Banking Industry | Investment Risk Management |
| Event Identification, Risk Assessment, and Risk response | Risk Tolerance Evaluation Techniques |
All registered papers will be published in SDIWC Digital Library, and in the proceedings of the conference.
03月03日
2016
03月05日
2016
初稿截稿日期
注册截止日期
留言