posted by user: saw2014 || 4544 views || tracked by 5 users: [display]

ICSSA 2016 : International Conference on Software Security and Assurance

FacebookTwitterLinkedInGoogle

Link: http://www.icssa.events/conf/
 
When Aug 24, 2016 - Aug 25, 2016
Where St. Pölten, Austria
Submission Deadline Jun 25, 2016
Notification Due Jul 4, 2016
Final Version Due Sep 5, 2016
Categories    software security   software engineering   code analysis   software risk management
 

Call For Papers

The 2nd International Conference on Software Security and Assurance
Software security is about building secure software and is getting significantly more attention from the computer security community.

Although many attempts have been made to improve software security over the years, traditional software security research has focused on a few tools and techniques (e.g, for static analysis). We believe that the scope of software security and assurance is much wider than those research areas.

Our conference provides a chance for academic and industry professionals to discuss recent progress in the area of software security and assurance and explore other facets of software security and assurance, which have not been as thoroughly studied. The program will feature:

* Technical papers,
* Invited talks, and
* Lightning talks and demos.


TOPICS OF INTEREST COMPRISE BUT ARE NOT LIMITED TO:
* Secure software design/architecture
* Secure software practices
* Security requirements engineering
* Security analysis tools and methods
* Security evaluation criteria and methodology
* Security education and training
* Vulnerability, threat, and risk analysis
* Malware detection/intrusion detection
* Obfuscation and software security
* Usability of secure software
* Security awareness for software developers

SUBMISSION
Prepare for a full paper of from 4 pages to 6 pages (Conference Publishing Services (CPS) Proceedings Manuscripts style: two columns, single-spaced), including figures and references, using 10 fonts, and number each page. You can confirm the Conference Publishing Services (CPS) Proceedings Author Guidelines at the following web page: http://www.computer.org/portal/web/cscps/submission.

Submitted papers will be carefully evaluated based on originality, significance, technical soundness, and clarity of exposition. All papers will be reviewed by at least three members of the program committee. Submit your paper to Easychair (https://easychair.org/conferences/?conf=icssa2016)

Accepted papers will be given guidelines in preparing and submitting the final manuscript(s) together with the notification of acceptance.

Authors of accepted paper(s), or at least one of them, are requested to register and present their work at the conference, otherwise their paper(s) will be removed from the digital library after the conference.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Ei/Scopus-ITCC 2026   2026 6th International Conference on Information Technology and Cloud Computing (ITCC 2026)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
Ei/Scopus-CMLDS 2026   2026 3rd International Conference on Computing, Machine Learning and Data Science (CMLDS 2026)
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
ICIAI 2026   2026 the 10th International Conference on Innovation in Artificial Intelligence (ICIAI 2026)
AI Security & Privacy 2025   First International Workshop on Artificial Intelligence Security and Privacy
SOEA 2026   10th International Conference on Software Engineering and Applications
CBMS 2025 - ST Security and Privacy 2025   CBMS 2025 - Special Track: Security and Privacy in Health Systems: Addressing Technology, Society, and Law
ACM ICCAI 2026   ACM--2026 12th International Conference on Computing and Artificial Intelligence (ICCAI 2026)