Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      

Int. Conf. on Computing Technology, Information Security and Risk Management

CTISRM

Date of beginning

Wednesday, 02 March 2016

Duration

3 days

Deadline for abstracts

Friday, 15 January 2016

City

Dubai

Country

United Arab Emirates

Contact

Lubna Kanan

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

100

Participants

0

Memo

The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016)

Islamic Azad University, Academic City, Dubai, UAE

March 2-4, 2016

http://sdiwc.net/conferences/ctisrm2016/

=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*

The proposed conference will be held at Islamic Azad University, Academic City, Dubai, UAE From March 2-4, 2016 which aims to enable researchers build connections between different digital applications.

The conference welcomes papers on the following (but not limited to) research topics:



**Computing Technology

- Face Recognition and High-Resolution Imaging

- Object Detection, Recognition and Categorization

- Adaptive Signal Processing

- Parallel Programming & Processing

- Coding and Modulation

- Mobile IP Networks/ Ad-hoc Networks

- Image Processing

- Data Modeling for Cloud-Based Networks

- Artificial Intelligence

- Expert Systems

- Modulation, Coding, and Channel Analysis

- Multimedia Signal Processing

- Video Compression and Streaming

- Data Mining for Social Network Analysis

- Mobile/ Wireless Network Modeling and Simulation

- Data Compression and Watermarking

- Speech Recognition, Analysis and Synthesis

- Energy Minimization in Cluster-Based Wireless Sensor Networks

- Data Cleaning and Processing

- Text and Web Mining

- Bluetooth and Personal Area Networks

- Wireless System Architecture

- Wireless Network Standard and Protocols

- Digital Right Management and Multimedia Protection

- Mobile Management in Wireless Networks

- Mobile Database Access and Design

**Information Security

- Multimedia and Document Security

- Operating System and Database Security

- Enterprise System Security

- Hardware-Based Security

- Social Network Security

- Wireless and Local Area Networks Security

- Network and Cyber Security

- Information Content Security

- Voice Over IP Security

- Wireless Communication Security

- E-Commerce Security

- Computer Forensics

- Security in Cloud Computing

- Security In Data Center

- Security of Web-Based Application and Services

- Threat, Vulnerability, and Risk Management

- Cryptography and Data Protection

- Computer Crime Prevention and Detection

- Surveillance Systems

- Security Policies and Trust Managements

**Risk Management

- Risk Handling Strategies

- Practical Risk Management

- Risk Management of Financial Information

- Risk Transfer Strategies

- Resource Risk Management

- Risk Management of IT

- Risk Management of Natural Disasters

- Enterprise Risk Management

- Medical Device Risk Management

- Risk Management in Petroleum and Gas

- Security Risk Management

- Risk Management Techniques for Active Trades

- Risk Management and Critical Infrastructure Protection

- Operational Risk Management

- Risk Management in Banking Industry

- Investment Risk Management

- Event Identification, Risk Assessment, and Risk response

- Risk Tolerance Evaluation Techniques



Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered.

Best selected papers will be published in one of the following special issues provided that the author do major improvements and extension within the time frame that will be set by the conference and his/her paper is approved by the chief editor:



International Journal of New Computer Architectures and their Applications (IJNCAA)

International Journal of Digital Information and Wireless Communications (IJDIWC)

International Journal of Cyber-Security and Digital Forensics (IJCSDF)

International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM)



=*=*=*=*=*=*=*=*=*=*=*=

IMPORTANT DATES



Submission Dates: Open from now until January 15, 2016

Notification of Acceptance: January 22, 2016 or 4 weeks from the submission date

Camera Ready Submission: Open from now until February 23, 2016

Registration: Open from now until February 23, 2016

Conference Dates: March 2-4, 2016