×

Avertissement

JUser::_load : impossible de charger l'utilisateur ayant l'ID 638

Print this page

The Second International Conference on Computing Technology, Information Security and Risk Management (CTISRM2017) Featured

Events Written by  samedi, 15 avril 2017 11:07 font size decrease font size increase font size
{JFBCLike}{SCGooglePlusOne}{JLinkedShare}{SCTwitterShare}

The conference aims to invite researchers from around the world to meet, greet and share collaborative minds as to present the research works. The conference welcomes papers on the following (but not limited to) research topics:

- Computing Technology
- Adaptive Signal Processing
- Coding and Modulation
- Image Processing
- Artificial Intelligence
- Modulation, Coding, and Channel Analysis
- Video Compression and Streaming
- Expert Systems
- Multimedia Signal Processing
- Data Mining for Social Network Analysis
- Data Compression and Watermarking
- Text and Web Mining
- Information Security
- Network and Cyber Security
- Voice Over IP Security
- E-Commerce Security
- Security in Cloud Computing
- Information Content Security
- Wireless Communication Security
- Computer Forensics
- Security In Data Center
- Risk Management
- Practical Risk Management
- Risk Transfer Strategies
- Risk Management of IT
- Enterprise Risk Management
- Resource Risk Management
- Risk Management of Natural Disasters
- Medical Device Risk Management
- Security Risk Management

The conference uses double-blind review by at least two reviewers, which means that both the reviewer and author identities are concealed from the reviewers, and vice versa, throughout the review process.

Impotant Dates
Submission Deadline: August 15, 2017
Notification of Acceptance: Within 2 weeks after date of submission
Camera Ready Deadline: September 18, 2017
Registration Deadline: September 18, 2017
Conference Dates: September 28-30, 2017

MORE INFORMATION

 
Read 37166 times