posted by user: sschritt || 3770 views || tracked by 3 users: [display]

ICSSA 2019 : 5th International Conference on Software Security and Assurance

FacebookTwitterLinkedInGoogle

Link: http://www.icssa.events
 
When Jul 25, 2019 - Jul 26, 2019
Where St. Pölten, Austria
Submission Deadline May 14, 2019
Notification Due Jun 23, 2019
Final Version Due Jul 5, 2019
Categories    software security   software engineering   code analysis   software risk management
 

Call For Papers

The 5th International Conference on
Software Security and Assurance (ICSSA 2019)
http://www.icssa.events
25-26 July 2019
St. Pölten University of Applied Sciences, Austria

INTRODUCTION
Software security is gaining increasingly more attention from the computer security community.

Although many attempts have been made to improve software security over the years, traditional software security research has relied on the tools and techniques focusing on testing (e.g., static analysis). We believe that the scope of software security and assurance is much wider than these limited research areas.

Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of software security and assurance and explore various facets of software security and assurance, which have not been thoroughly studied yet.

The conference will feature:
* Technical papers,
* Invited talks and panel sessions, and
* Lightning talks and demos.

TOPICS OF INTEREST ARE (BUT ARE NOT LIMITED TO):
* Secure software design/architecture
* Secure software practices
* Security requirements engineering
* Security analysis tools and methods
* Security evaluation criteria and methodology
* Security education and training
* Vulnerability, threat, and risk analysis
* Malware detection/intrusion detection
* Obfuscation and software security
* Usability of secure/security software
* Security awareness for software developers

SUBMISSION
Prepare a full paper of 4 to 6 pages in the IEEE Conference Publishing Services (CPS) Proceedings Manuscripts style: two columns, single-spaced, including figures and references, using 10 point fonts, and number each page. You can review the CPS Proceedings Author Guidelines at the following web page: http://www.computer.org/portal/web/cscps/submission.

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. All papers will be reviewed by at least three members of the program committee. Submit your paper to Easychair (https://easychair.org/conferences/?conf=icssa2019).

Accepted papers will be given further guidance on preparing and submitting the final manuscript(s) together with the notification of acceptance. The proceedings will be submitted for publication by CPS with 4 to 6 pages for each paper. Conference proceedings will be submitted for inclusion to IEEE Xplore.

Authors of accepted paper(s), or at least one of them, are required to register and present their work at the conference. Otherwise, their paper(s) will not be included in the conference proceedings.

Related Resources

CYBERSEC 2026   The First International Conference on Security and Cybersecurity in the AI and Digital Context
Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
ISCA 2026   The 53rd IEEE/ACM International Symposium on Computer Architecture (ISCA 2026)
Ei/Scopus-CMLDS 2026   2026 3rd International Conference on Computing, Machine Learning and Data Science (CMLDS 2026)
SeRIM 2026   2nd International Workshop on Security and Risk in Identity Management
ICIAI 2026   2026 the 10th International Conference on Innovation in Artificial Intelligence (ICIAI 2026)
AI-SS 2026   1st International Workshop on AI Safety and Security
ACM ICCAI 2026   ACM--2026 12th International Conference on Computing and Artificial Intelligence (ICCAI 2026)
IEEE SPML 2026   2026 IEEE 9th International Conference on Signal Processing and Machine Learning (SPML 2026)
SEAS 2026   15th International Conference on Software Engineering and Applications