Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Feb 2017 13:12:04 +0800
From:      Jerika Joshua <jerika.sdiwc@gmail.com>
To:        freebsd-mobile@freebsd.org
Subject:   CFP: CTISRM2017 (Computing Technology, Information Security and Risk Management ), September 28-30, 2017 , Morocco
Message-ID:  <CAFMRaBUdBtomBv_1v2%2B6P%2BZvQ3rXEfbsavTM30P9PaZPHZW_JQ@mail.gmail.com>

next in thread | raw e-mail | index | archive | help
** Apologies for cross-posting **
** Please forward to anybody who might be interested **

*** CALL FOR PAPERS ***

CTISRM2017 - The Second International Conference on Computing Technology,
Information Security and Risk Management

September 28-30, 2017
ISGA (Higher Institute of Engineering and Business - Marrakesh),
Marrakesh, Kingdom of Morocco

Website:
http://sdiwc.net/conferences/2nd-international-conference-on-computing-technology-information-security-and-risk-management/

IMPORTANT DATES
Submission Deadline         : Open from now until August 15, 2017
Notification of Acceptance  : Open from now until September 5, 2017
Camera Ready Submission     : Open from now until September 18, 2017
Registration Deadline       : Open from now until September 18, 2017
Conference Dates            : September 28-30, 2017

Paper Submission:
http://sdiwc.net/conferences/2nd-international-conference-on-computing-technology-information-security-and-risk-management/openconf/openconf.php

Write us for more details: ctisrm17@sdiwc.net

All registered papers will be included in SDIWC Digital Library.

The conference aims to enable researchers build connections between
different digital applications. The event will be held over three days,
with presentations delivered by researchers from the international
community, including presentations from keynote speakers and
state-of-the-art lectures.

RESEARCH TOPICS ARE NOT LIMITED TO:

COMPUTING TECHNOLOGY
Face Recognition and High-Resolution Imaging
Object Detection, Recognition and Categorization
Adaptive Signal Processing
Parallel Programming & Processing
Coding and Modulation
Mobile IP Networks/ Ad-hoc Networks
Image Processing
Data Modeling for Cloud-Based Networks
Artificial Intelligence Expert Systems
Modulation, Coding, and Channel Analysis
Multimedia Signal Processing
Video Compression and Streaming Data Mining for Social Network Analysis
Mobile/ Wireless Network Modeling and Simulation
Data Compression and Watermarking
Speech Recognition, Analysis and Synthesis
Energy Minimization in Cluster-Based Wireless Sensor Networks
Data Cleaning and Processing
Text and Web Mining
Bluetooth and Personal Area Networks
Wireless System Architecture
Wireless Network Standard and Protocols
Digital Right Management and Multimedia Protection
Mobile Management in Wireless Networks
Mobile Database Access and Design

INFORMATION SECURITY
Multimedia and Document Security
Operating System and Database Security
Enterprise System Security
Hardware-Based Security
Social Network Security Wireless and Local Area Networks Security
Network and Cyber Security
Information Content Security
Voice Over IP Security
Wireless Communication Security
E-Commerce Security Computer Forensics
Security in Cloud Computing Security In Data Center
Security of Web-Based Application and Services  Threat, Vulnerability, and
Risk Management
Cryptography and Data Protection
Computer Crime Prevention and Detection
Surveillance Systems
Security Policies and Trust Managements

RISK MANAGEMENT
Risk Handling Strategies
Practical Risk Management
Risk Management of Financial Information
Risk Transfer Strategies
Resource Risk Management
Risk Management of IT
Risk Management of Natural Disasters
Enterprise Risk Management
Medical Device Risk Management
Risk Management in Petroleum and Gas
Security Risk Management
Risk Management Techniques for Active Trades
Risk Management and Critical Infrastructure Protection
Operational Risk Management
Risk Management in Banking Industry Investment Risk Management
Event Identification, Risk Assessment, and Risk response
Risk Tolerance Evaluation Techniques


The conference uses double-blind review by at least two reviewers, which
means that both the reviewer and author identities are concealed from the
reviewers, and vice versa, throughout the review process. To facilitate
this, authors need to ensure that their manuscripts are prepared in a way
that does not give away their identity.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAFMRaBUdBtomBv_1v2%2B6P%2BZvQ3rXEfbsavTM30P9PaZPHZW_JQ>