We sincerely invite you to take part in 2018 The International Conference on Automated Software Engineering and Communication Security (ICASECS 2018) in Osaka, Japan during March 19-20, 2018.
The aim of ICASECS 2018 is to provide an excellent platform for both academicians and practitioners to share their experience and knowledge in engineering education at all levels. It provides a valuable opportunity for researchers, scholars and scientists to exchange their ideas face to face . Both research and practice-oriented papers are welcome in order to emphasize the needs of interdisciplinary collaboration in engineering and education.
The Automated Software Engineering and Communication security Conference is the premier research forum for automated software engineering and Communication Security . This conference brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ICASECS 2018 invites high quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to :
Automated Software Engineering
Automated reasoning techniques
Component-based service-oriented systems
Cloud computing
Computer-supported cooperative work
Configuration management
Data mining for software engineering
Domain modeling and meta-modeling
Empirical software engineering
Human-computer interaction
Knowledge acquisition and management
Mobile app development
Maintenance and evolution
Model-driven development
Program synthesis & transformations, automated defect repair
Program comprehension
Reverse engineering and re-engineering
Recommender systems for software engineering
Requirements engineering
Specification languages
Software analysis
Software architecture and design
Software product line engineering
Software visualization
Software security and trust; data privacy
Testing, verification, and validation
Communication Security
Access Control
Applied Cryptography
Biometrics Security and Privacy
Critical Infrastructure Protection
Certification and Accreditation
Cross-Layer Design for Security
Data Integrity
Data Protection
Database Security and Privacy
Digital Forensics
Digital Rights Management
Defensive Information Warfare
Denial of Service Protection, Intrusion Detection, Anti-Malware
Distributed Systems Security
Ethical and Legal Implications of Security and Privacy
Electronic Commerce
E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
Grid Security
Formal Methods for Security
Human Factors and Human Behavior Recognition Techniques
Identification, Authentication and Non-repudiation
Identity Management
Information Systems Auditing
Intellectual Property Protection
Intrusion Detection & Prevention
Information Hiding and Watermarking & Information Survivability
Insider Threat Protection, Integrity
Internet/Intranet Security
Key Management and Key Recovery
Language-based Security
Mobile and Wireless Security
Mobile, Ad Hoc and Sensor Network Security
Monitoring and Surveillance
Multimedia Security ,Operating System Security, Peer-to-Peer Security
Performance Evaluations of Protocols & Security Application
Privacy and Data Protection
Product Evaluation Criteria and Compliance
Risk Evaluation and Security Certification
Reliability and Dependability
Secure Software Development Methodologies
Security and Privacy for Big Data
Security and privacy in Complex Systems
Security and Privacy in Crowdsourcing
Security and Privacy in IT Outsourcing
Security and Privacy in Location-based Services
Security and Privacy in Mobile Systems
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in Smart Grids
Security and Privacy in Social Networks
Security and Privacy in the Cloud
Security and Privacy in Web Services
Security and Privacy Policies
Security Area Control
Security Deployment
Security Engineering
Security in Distributed Systems
Security Information Systems Architecture
Security Management
Security Metrics and Measurement
Security Protocols
Security requirements
Security Verification and Validation
Sensor and Mobile Ad Hoc Network Security
Service and Systems Design and QoS Network Security
Software Security
Trusted Computing
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security
Ubiquitous Computing Security
Virtualization Security, VoIP Security, Web 2.0 Security
Risk/Vulnerability Assessment
Management of Computing Security
Network Security
Organizational Security Policies
Peer-to-Peer Security
Personal Data Protection for Information Systems
Privacy Enhancing Technologies