posted by user: modsim || 1794 views || tracked by 3 users: [display]

ICSSA 2018 : 4th International Conference on Software Security and Assurance

FacebookTwitterLinkedInGoogle

Link: http://security.swu.ac.kr/icssa18/
 
When Jul 26, 2018 - Jul 27, 2018
Where Seoul, South Korea
Submission Deadline Jun 4, 2018
Notification Due Jun 23, 2018
Final Version Due Jul 5, 2018
Categories    software security   software engineering   code analysis   software risk management
 

Call For Papers

The 4th International Conference on
Software Security and Assurance (ICSSA 2017)
http://security.swu.ac.kr/icssa18/
26-27 July 2018
Seoul Women’s University, Seoul, South Korea

INTRODUCTION
Software security is gaining increasingly more attention from the computer security community.

Although many attempts have been made to improve software security over the years, traditional software security research has relied on the tools and techniques focusing on testing (e.g., static analysis). We believe that the scope of software security and assurance is much wider than these limited research areas.

Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of software security and assurance and explore various facets of software security and assurance, which have not been thoroughly studied yet.

The conference will feature:
* Technical papers,
* Invited talks and panel sessions, and
* Lightning talks and demos.

TOPICS OF INTEREST ARE (BUT ARE NOT LIMITED TO):
* Secure software design/architecture
* Secure software practices
* Security requirements engineering
* Security analysis tools and methods
* Security evaluation criteria and methodology
* Security education and training
* Vulnerability, threat, and risk analysis
* Malware detection/intrusion detection
* Obfuscation and software security
* Usability of secure/security software
* Security awareness for software developers

SUBMISSION
Prepare a full paper of 4 to 6 pages in the IEEE Conference Publishing Services (CPS) Proceedings Manuscripts style: two columns, single-spaced, including figures and references, using 10 point fonts, and number each page. You can review the CPS Proceedings Author Guidelines at the following web page: http://www.computer.org/portal/web/cscps/submission.

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. All papers will be reviewed by at least three members of the program committee. Submit your paper to Easychair (https://easychair.org/conferences/?conf=icssa2018).

Accepted papers will be given further guidance on preparing and submitting the final manuscript(s) together with the notification of acceptance. The proceedings will be submitted for publication by CPS with 4 to 6 pages for each paper. Conference proceedings will be submitted for inclusion to IEEE Xplore.

Authors of accepted paper(s), or at least one of them, are required to register and present their work at the conference. Otherwise, their paper(s) will not be included in the conference proceedings.

Related Resources

ACM--CSAI--Ei Compendex, Scopus 2018   ACM--2018 2nd International Conference on Computer Science and Artificial Intelligence (CSAI 2018)--Ei Compendex, Scopus
RASS 2018   Special issue on Recent Advances in Software Security - EURASIP Journal on Information Security
IJAB 2018   International Journal of Advances in Biology
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
IJGTT 2018   International Journal of Game Theory and Technology
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
IEEE--ISCMI--EI Compendex and Scopus 2018   2018 IEEE 5th Intl. Conference on Soft Computing & Machine Intelligence (ISCMI 2018)--EI Compendex and Scopus
ADON 2018   International Workshop on Anomaly Detection ON the Cloud and the Internet of Things
ACNS 2019   International Conference on Applied Cryptography and Network Security
IJCSEIT 2018   International Journal of Computer Science, Engineering and Information Technology