8th International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT 2020)

  • Jul 2020

Description

Topics
  • Access to Online Information: Rights and Obligations
  • Access Control and Privacy Protection
  • Advanced Multi-modal Interfaces for Security
  • Administration Security Policy
  • Authentication Mechanisms and Systems
  • Attack Information: Analysis for Detection and Prevention
  • Business Intelligence for Local and Global Users
  • Business and Security Risk Models
  • Business Ontology
  • Business Intelligence and Business Analytics
  • Cloud Backup and Recovery
  • Business Quality Models for Universities, Enterprises and Industries
  • Cloud Development Tools and Applications
  • Cloud Compatibility and Interoperability
  • Cloud Quality Services and Costs
  • Cloud Programming Models and Paradigms
  • Consequences of the Cyber Destruction and International Legislation
  • Communicability for Business Intelligence
  • Cyber Behaviour
  • Cryptographic Protocols
  • Cyber Security Automation
  • Cyber Destructors and Parochialism
  • Data Privacy and Security
  • Data Management and Security for Outsourcing
  • Database: Design, Security and Authorization
  • Data Warehousing for Business Intelligence
  • Digital Contents and Copyright Protection Techniques
  • Digital Cartography for the Localization of the Cyber Destructors
  • Ethics and Aesthetics of the Interactive Contents Online and Off-line
  • Education and Cloud Computing
  • Federated Database System and Cloud Computing
  • Evaluation of the Impact of Security Efficiency on User Satisfaction
  • Green and Original Cloud Applications
  • Firewall Systems and Management
  • Health Informatics, Health Technologies and Information Privacy
  • Hacking Democracy
  • Human and Social Factors in Security and Confidential Information
  • Heuristic Evaluation for Cyber Attacks
  • Information Architecture Design for Cloud Computing and Security
  • Identity Theft Protection and Profession Cloning Detection
  • Intellectual Property and Copyright
  • Information Society and International Legislation for New Technologies
  • Interactive Design for International Users Security and Privacy Information
  • Intelligent Information Systems and Security Services
  • Intrusion Detection
  • Interfaces Models and the Interaction with Security Systems
  • Library Systems and Database Development for Information Architecture
  • Key Management and Authentication
  • Mobile Cloud for Industrial Production and Business
  • Methods and Techniques for Stopping Attacks in Social Networking
  • Multimedia Mobile Data Vulnerable
  • Mobile Security Systems and Technologies
  • Natural Interfaces, Communicability and Strong Security for Interactive Systems
  • Multimedia Mobile Phone for Business Intelligence
  • Network Security Issues and Protocols
  • Network Security Engineering
  • Networking Security Systems for Cloud Computing
  • Networking for Business Intelligence
  • Ontology for Private and Confidential Information Management
  • New Media and Marketing for Cloud Computing
  • Persuasion and Manipulation of the Online Information for Business
  • Open Software and Commercial Software for Anti-virus
  • Privacy and Integrity of the Information for Outsourcing
  • Pervasive Systems and Ubiquitous Computing in the Cloud
  • Psychiatry for Cyber Destructors
  • Privacy in Cloud Computing
  • Real-time Business Intelligence
  • Quality Attributes and Metrics for the Evaluation of the Cyber Destructors
  • Security in Grid
  • Security Certification: Standardization and Guidelines
  • Security, Trust and Privacy in Commerce Online
  • Security Policies and User Behaviour
  • Social Psychology and Human Behaviour in Safety, Security and Privacy
  • Semantic Computing and Security
  • Standard and High Performance Cloud Computing
  • Special Algorithms for Optimization Security and Cloud Computing Information
  • Techniques and Methodologies for Virtual Defense
  • Strategies for Cloud Assessment
  • Usability Engineering and Communicability for Information Architecture
  • Theory and Applications of Cryptology
  • Voice, Face and Signature Recognition Systems for Security
  • Veracity, Credibility and Reputation Management
  • Web 2.0: Safety and Security
  • Vulnerability Analysis
  • Wireless Data Communications and Privacy
  • Web 3.0 and Business Intelligence
Who should Attend
  • Experts
  • Professionals
  • Professors
  • Students
  • Businessmen
  • Researchers

Past Events

Important

Please, check "International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology (HIASCIT)" official website for possible changes, before making any traveling arrangements

Event Categories

Business: E-Business, Innovations, Security & Safety
Education: Education Technologies & Methods
Government & Global Issues: Law & Regulations
Science: Computer Science
Services: Banking
Technology: Data management, Information Technology (IT), Internet, IT Security, Software & Applications, Software engineering, Telecommunication

Other Events with Similar Categories

Other Events with Similar Location or Organizer

Featured Conferences & Exhibitions