posted by system || 5442 views || tracked by 9 users: [display]

SECTEST 2011 : The 2nd International Workshop on Security Testing

FacebookTwitterLinkedInGoogle

Link: http://sites.google.com/site/icst2011
 
When Mar 21, 2011 - Mar 25, 2011
Where Berlin, Germany
Submission Deadline Dec 21, 2010
Notification Due Jan 31, 2011
Categories    security   software
 

Call For Papers

---------------------------------------------
Fourth International Conference on
Software Testing, Verification and Validation
March 21-25, 2011, Berlin
http://sites.google.com/site/icst2011/
---------------------------------------------

=============================
CALL FOR POSTER PRESENTATIONS
=============================

Purpose of the poster session
-----------------------------
An alternative approach for the presentation of ongoing projects/new work will be available for conference participants. An area on the conference premises has been designated for the presentation of information regarding projects or activities of interest to participants. The Poster session is part of the exhibition. Thus, posters are exhibited from March 22 to 24, 2011.
Poster presenters are expected to bring their printed poster and handouts and stay during the entire session. Attendees will browse among the posters and speak directly with the presenters. Thus, the poster session is intended to be informal, conversational.

Topics of interest
------------------
• Software testing theory and practice
• Model-based testing
• Domain specific testing including, incl. testing of security, web services, databases, embedded software, and OO software
• Verification & validation
• Quality assurance
• Model checking
• Empirical studies
• Metrics
• Fuzz testing
• Inspections
• Tools
• Testability and diagnosability
• Design for testability
• Testing education
• Testing in multidisciplinary applications
• Technology transfer
• Model-driven engineering and testing
• Agile/iterative/incremental testing processes
• Open source software/3rd party software testing
• Novel approaches to software reliability assessment

Poster Guidelines
-----------------
The poster should be A1 size (59.4 cm x 84.1 cm or 23.4 inches x 33.1 inches) and may be handmade or printed. However, please note that only posters of informative and technical-scientific style will be accepted! The only accepted language for the poster is English.

Handout Guidelines
------------------
Each poster presentation is invited to provide own copies of an accompanying handout for distribution (maximum 2 pages). Handouts must include following information:
• Contact information: name of presenter(s), affiliated organization / agency, location
• Topic(s) of focus
• Description of the subject (process, methods)
• Evaluation and outcomes (i.e., observations, key findings, anecdotes, etc.)
• Funds, resources (human, financial, institutional) of the project

Poster Submission, Exhibition, and Presentation
-----------------------------------------------
Please upload your poster and your accompanying handout as pdf-files by Dec. 15, 2010 using the conference system:

http://www.easychair.org/conferences/?conf=icst2011poster

Posters are presented in the conference exhibition area March 22-24, 2011. Furthermore, poster presenters are invited to join the conference welcome reception March 21, 2011 to have poster discussions.

No Extra Participation Fee
--------------------------
Participation at the poster session is included in the conference fee.

Review and Notification
-----------------------
Selection will be made by a poster session committee of ICST, chaired by Fevzi Belli (belli@upb.de). You will be notified by Jan. 31, 2011 of your acceptance for the poster session. For more information contact Fevzi Belli or Michael Linschulte (linschu@upb.de).

Important Dates
---------------
Submission of Posters: Dec. 15, 2010
Acceptance notification: Jan. 31, 2011

For more information follow:
http://sites.google.com/site/icst2011/posters

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
BIBC 2024   5th International Conference on Big Data, IOT and Blockchain
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
VCOI 2024   International Conference on Vision and Computational Intelligence
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience
SECRYPT 2025   22nd International Conference on Security and Cryptography
AGRIJ 2024   Agricultural Science: An International journal