CTISRM 2017

Date: Sep 28, 2017 1:00 am – Sep 30, 2017 12:00 pm
Location: Marrakesh, Kingdom of Morocco

The Second International Conference on Computing Technology, Information Security and Risk Management (CTISRM2017)

ISGA (Higher Institute of Engineering and Business - Marrakesh)

The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures.

Topics:

Computing Technology

  • Face Recognition and High-Resolution Imaging
  • Object Detection, Recognition and Categorization
  • Adaptive Signal Processing
  • Parallel Programming & Processing
  • Coding and Modulation
  • Mobile IP Networks/ Ad-hoc Networks
  • Image Processing Data
  • Modeling for Cloud-Based Networks
  • Artificial Intelligence
  • Expert Systems
  • Modulation, Coding, and Channel Analysis
  • Multimedia Signal Processing
  • Video Compression and Streaming
  • Data Mining for Social Network Analysis
  • Mobile/ Wireless Network Modeling and Simulation
  • Data Compression and Watermarking
  • Speech Recognition, Analysis and Synthesis
  • Energy Minimization in Cluster-Based
  • Wireless Sensor Networks
  • Data Cleaning and Processing
  • Text and Web Mining
  • Bluetooth and Personal Area Networks
  • Wireless System Architecture
  • Wireless Network Standard and Protocols
  • Digital Right Management and Multimedia Protection
  • Mobile Management in Wireless Networks
  • Mobile Database Access and Design

Information Security

  • Multimedia and Document Security
  • Operating System and Database Security
  • Enterprise System Security
  • Hardware-Based Security
  • Social Network Security
  • Wireless and Local Area Networks Security
  • Network and Cyber Security
  • Information Content Security
  • Voice Over IP Security
  • Wireless Communication Security
  • E-Commerce
  • Security Computer Forensics
  • Security in Cloud Computing
  • Security In Data Center
  • Security of Web-Based Application and Services
  • Threat, Vulnerability, and Risk Management
  • Cryptography and Data Protection
  • Computer Crime Prevention and Detection
  • Surveillance Systems Security
  • Policies and Trust Managements

Risk Management

  • Risk Handling Strategies
  • Practical Risk Management
  • Risk Management of Financial Information
  • Risk Transfer Strategies
  • Resource Risk Management
  • Risk Management of IT
  • Risk Management of Natural Disasters
  • Enterprise Risk Management
  • Medical Device Risk Management
  • Risk Management in Petroleum and Gas
  • Security Risk Management
  • Risk Management Techniques for Active Trades
  • Risk Management and Critical Infrastructure
  • Protection Operational Risk Management
  • Risk Management in Banking Industry
  • Investment Risk Management
  • Event Identification, Risk Assessment, and Risk response
  • Risk Tolerance Evaluation Techniques
  • CPS Domains
  • Medical Devices
  • Robotics
  • CPS Technologies
  • Wireless Sensing and Actuation
  • Foundations
  • Modeling
  • Science of Security
  • Simulation
  • Conference
  • 2017
Submitted by Anonymous on Wed, 01/25/2017 - 09:57