posted by system || 3716 views || tracked by 9 users: [display]

SECTEST 2011 : The 2nd International Workshop on Security Testing


When Mar 21, 2011 - Mar 25, 2011
Where Berlin, Germany
Submission Deadline Dec 21, 2010
Notification Due Jan 31, 2011
Categories    security   software

Call For Papers

Fourth International Conference on
Software Testing, Verification and Validation
March 21-25, 2011, Berlin


Purpose of the poster session
An alternative approach for the presentation of ongoing projects/new work will be available for conference participants. An area on the conference premises has been designated for the presentation of information regarding projects or activities of interest to participants. The Poster session is part of the exhibition. Thus, posters are exhibited from March 22 to 24, 2011.
Poster presenters are expected to bring their printed poster and handouts and stay during the entire session. Attendees will browse among the posters and speak directly with the presenters. Thus, the poster session is intended to be informal, conversational.

Topics of interest
• Software testing theory and practice
• Model-based testing
• Domain specific testing including, incl. testing of security, web services, databases, embedded software, and OO software
• Verification & validation
• Quality assurance
• Model checking
• Empirical studies
• Metrics
• Fuzz testing
• Inspections
• Tools
• Testability and diagnosability
• Design for testability
• Testing education
• Testing in multidisciplinary applications
• Technology transfer
• Model-driven engineering and testing
• Agile/iterative/incremental testing processes
• Open source software/3rd party software testing
• Novel approaches to software reliability assessment

Poster Guidelines
The poster should be A1 size (59.4 cm x 84.1 cm or 23.4 inches x 33.1 inches) and may be handmade or printed. However, please note that only posters of informative and technical-scientific style will be accepted! The only accepted language for the poster is English.

Handout Guidelines
Each poster presentation is invited to provide own copies of an accompanying handout for distribution (maximum 2 pages). Handouts must include following information:
• Contact information: name of presenter(s), affiliated organization / agency, location
• Topic(s) of focus
• Description of the subject (process, methods)
• Evaluation and outcomes (i.e., observations, key findings, anecdotes, etc.)
• Funds, resources (human, financial, institutional) of the project

Poster Submission, Exhibition, and Presentation
Please upload your poster and your accompanying handout as pdf-files by Dec. 15, 2010 using the conference system:

Posters are presented in the conference exhibition area March 22-24, 2011. Furthermore, poster presenters are invited to join the conference welcome reception March 21, 2011 to have poster discussions.

No Extra Participation Fee
Participation at the poster session is included in the conference fee.

Review and Notification
Selection will be made by a poster session committee of ICST, chaired by Fevzi Belli ( You will be notified by Jan. 31, 2011 of your acceptance for the poster session. For more information contact Fevzi Belli or Michael Linschulte (

Important Dates
Submission of Posters: Dec. 15, 2010
Acceptance notification: Jan. 31, 2011

For more information follow:

Related Resources

TrustCom 2018   The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
DSN 2018   The 48th IEEE/IFIP International Conference on Dependable Systems and Networks
ISSTA 2018   International Symposium on Software Testing and Analysis
Future_Internet-SI 2017   Futute Internet - Special Issue on Security and Privacy in Wireless and Mobile Networks
Cyber Security 2018   IEEE International Conference on Cyber Security and Protection of Digital Services
AI 2017   3rd International Conference on Artificial Intelligence and Applications
ICST 2018   The 11th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2018)
eCrime 2018   13th Symposium on Electronic Crime Research
Smart-City-IoT-Security 2017   Special Issue on Security of IoT-enabled Infrastructures in Smart Cities