The SDIWC International Conference on Computing Technology, Information Security and Risk Management (CTISRM) 2016 Dubai

  • Conference Call
  • You are invited to par­tic­i­pate in The Inter­na­tional Con­fer­ence on Com­put­ing Tech­nol­ogy, Infor­ma­tion Secu­rity and Risk Man­age­ment (CTISRM2016) that will be held in Dubai, UAE on March 35, 2016 at the Islamic Azad Uni­ver­sity. The event will be held over three days, with pre­sen­ta­tions deliv­ered by researchers from the inter­na­tional com­mu­nity, includ­ing pre­sen­ta­tions from keynote speak­ers and state-​of-​the-​art lectures.

    Con­fer­ence Topics

    The con­fer­ence wel­comes papers on the fol­low­ing (but not lim­ited to) research topics:

    Com­put­ing Technology

    • Adap­tive Sig­nal Processing
    • Arti­fi­cial Intelligence
    • Blue­tooth and Per­sonal Area Networks
    • Cod­ing and Modulation
    • Data Clean­ing and Processing
    • Data Com­pres­sion and Watermarking
    • Data Min­ing for Social Net­work Analysis
    • Data Mod­el­ing for Cloud-​Based Networks
    • Dig­i­tal Right Man­age­ment and Mul­ti­me­dia Protection
    • Energy Min­i­miza­tion in Cluster-​Based Wire­less Sen­sor Networks
    • Expert Sys­tems
    • Face Recog­ni­tion and High-​Resolution Imaging
    • Image Pro­cess­ing
    • Mobile Data­base Access and Design
    • Mobile IP Networks/​Ad-​hoc Networks
    • Mobile Man­age­ment in Wire­less Networks
    • Mobile/​Wire­less Net­work Mod­el­ing and Simulation
    • Mod­u­la­tion, Cod­ing, and Chan­nel Analysis
    • Mul­ti­me­dia Sig­nal Processing
    • Object Detec­tion, Recog­ni­tion and Categorization
    • Par­al­lel Pro­gram­ming & Processing
    • Speech Recog­ni­tion, Analy­sis and Synthesis
    • Text and Web Mining
    • Video Com­pres­sion and Streaming
    • Wire­less Net­work Stan­dard and Protocols
    • Wire­less Sys­tem Architecture

    Infor­ma­tion Security

    • Com­puter Crime Pre­ven­tion and Detection
    • Com­puter Forensics
    • Cryp­tog­ra­phy and Data Protection
    • E-​Commerce Security
    • Enter­prise Sys­tem Security
    • Hardware-​Based Security
    • Infor­ma­tion Con­tent Security
    • Mul­ti­me­dia and Doc­u­ment Security
    • Net­work and Cyber Security
    • Oper­at­ing Sys­tem and Data­base Security
    • Secu­rity in Cloud Computing
    • Secu­rity In Data Center
    • Secu­rity of Web-​Based Appli­ca­tion and Services
    • Secu­rity Poli­cies and Trust Managements
    • Social Net­work Security
    • Sur­veil­lance Systems
    • Threat, Vul­ner­a­bil­ity, and Risk Management
    • Voice Over IP Security
    • Wire­less and Local Area Net­works Security
    • Wire­less Com­mu­ni­ca­tion Security

    Risk Man­age­ment

    • Enter­prise Risk Management
    • Event Iden­ti­fi­ca­tion, Risk Assess­ment, and Risk response
    • Invest­ment Risk Management
    • Med­ical Device Risk Management
    • Oper­a­tional Risk Management
    • Prac­ti­cal Risk Management
    • Resource Risk Management
    • Risk Han­dling Strategies
    • Risk Man­age­ment and Crit­i­cal Infra­struc­ture Protection
    • Risk Man­age­ment in Bank­ing Industry
    • Risk Man­age­ment in Petro­leum and Gas
    • Risk Man­age­ment of Finan­cial Information
    • Risk Man­age­ment of IT
    • Risk Man­age­ment of Nat­ural Disasters
    • Risk Man­age­ment Tech­niques for Active Trades
    • Risk Tol­er­ance Eval­u­a­tion Techniques
    • Risk Trans­fer Strategies
    • Secu­rity Risk Management

    Pub­li­ca­tion Opportunities

    All reg­is­tered papers will be pub­lished in SDIWC Dig­i­tal Library, and in the pro­ceed­ings of the conference.

    All sub­mit­ted Papers will be reviewed by a min­i­mum of two review­ers. The pub­lished pro­ceed­ings will be indexed by at least five or more of the fol­low­ing: DBLP, EI, INSPEC, Research Bible, Scirus, Microsoft Aca­d­e­mic Research, Research­Gate, and Google Scholar Data­bases. In addi­tion, best selected papers will be pub­lished in one of the fol­low­ing spe­cial issues pro­vided that the author do major improve­ments and exten­sion within the time frame that will be set by the con­fer­ence and his/​her paper is approved by the chief editor:

    Pro­gram Committees

    Gen­eral Chair

    • Moham­mad V. Malakooti, Islamic Azad Uni­ver­sity (IAU), Dubai

    Orga­niz­ing Chair

    • Wathiq Man­soor, Amer­i­can Uni­ver­sity in Dubai, UAE

    Pro­gram Chairs

    • Fad­hi­lah Ahmad, Uni­ver­sity Sul­tan Zainal Abidin, Malaysia
    • Jan Platos, VSB-​Technical Uni­ver­sity of Ostrava, Czech Republic

    Pro­gram Co-​Chair

    • Jacek Stando, Tech­ni­cal Uni­ver­sity of Lodz, Poland

    Pub­li­ca­tion Chairs

    • Yoshiro Imai, Kagawa Uni­ver­sity, Japan
    • Ousa­nee Sawagvud­cha­ree, Stam­ford Inter­na­tional Uni­ver­sity, Phetch­aburi, Thailand

    Pub­li­ca­tion Co-​Chair

    • Jim Yon­azi, The Insti­tute of Finance Man­age­ment, Tanzania

    Pub­lic­ity Chair

    • Tutut Her­awan, Uni­ver­sity Malaysia Pahang, Malaysia

    Review­ers

    • Ali A. Yassin, Basra Uni­ver­sity, Iraq
    • Olorun­toyin Sefiu Taiwo, Ladoke Akin­tola Uni­ver­sity of Tech­nol­ogy, Nigeria
    • Yilun Shang, Tongji Uni­ver­sity, China
    • Muham­mad Aihab Khan, Iqra Uni­ver­sity, Pakistan
    • Tushar Gokhale, South­ern Methodist Uni­ver­sity, Texas
    • Par­dis Pourghomi, Amer­i­can Uni­ver­sity of the Mid­dle East (AUM), Kuwait
    starting: ending: 05.03.2016 Location: , Category:

    Timeline

    Conference START 05.03.2016 END

    All deadlines have expired!

    This conference has no more open deadlines. There may be successive conferences coming up you may by interested in.

    Please check our conference list and search...

    Conference Facts

    Location , Address Islamic Azad University Category Organiser More Info Conference Website

    Further interesting Conferences

    Currently we have no similar events listed. Please check our website regulary, subscribe to our RSS-Feed or follow us on twitter for new listings.