| The conference welcome papers on the following (but not limited to) research topics: |
| Information System Security |
| Telecommunication and Networks |
Data Resource Management |
| Information Security Models |
Network Monitoring |
| Information Classification Methods |
Security, Ethical, and Social Challenges |
| Cyber Security Models |
Cyber Security Risk Evaluation |
| Artificial Intelligence Technologies in Business |
Using Information Technology for Strategic Advantages |
| Access Control Mechanisms and Data Classification |
Information Technology Security Evaluation Criteria |
| Data Classification and Clustering |
Security and Robustness in Wireless Networks |
| Access Control Systems |
Mobile Secure Gateway |
| Cloud Computing Security Models |
Information Security and Event Management |
| Intelligent Database Security |
Cloud Computing Security Issues and Challenges |
| Information Redundancy in Cloud Computing |
Cloud Computing Security Management |
| Cloud Computing Security Issues and its Challenges |
Digital Right Management and Multimedia Protection |
| Robotics Modeling |
| Robotics Modeling, Planning and Control |
Dynamics and Motion Control of Robot Manipulators |
| Motion planning, and Mobile Robots |
Environmental Interaction using Exteroceptive Sensory Data |
| Intelligent Robotics and Autonomous Agent |
The Technology of Actuators and Sensors |
| Theory, Algorithm and Implementation of the Robotics Motion |
Motions of Manipulators in Terms of Trajectories Through Space |
| Robotics, Vision, and Control |
Neural network and Learning Machines |
| Theory of Applied Robotics: Kinematics, Dynamics, and Control |
Motion Planning and Trajectories generation Algorithm |
| Robotics Modeling and Simulation |
Rigid Motions and Homogeneous Transformations |
| Dynamical Systems and Stability Theory |
Computer Vision and Vision based Control |
| E-Commerce Transactions |
| Electronic Fund Transfer |
Supply Chain Management |
| Internet Marketing |
Online Transaction Processing |
| Electronic Data Interchange and the Barriers for Implementation |
Inventory Management |
| Automated Data Collection Systems |
E-commerce Systems |
| E-Commerce Applications and Issues |
Customer Relationship Management |
| Enterprise Business Systems |
Decision Support Systems |
| Secure Electronic Transaction in E-Commerce |
Reliability Modeling and Prediction for E-Commerce Systems |
| Key Factors for Developing a Successful E-Commerce System |
E-Commerce Security Protocols |