International Conference on Automated Software Engineering and Communication Security (ICASECS 2018)

  • 19-20 Mar 2018
  • Hilton Osaka, Japan

Description

The International Conference on Automated Software Engineering and Communication Security (ICASECS 2018) covers topics such as:

  • Communication Security
    • Applied Cryptography
    • Access Control
    • Critical Infrastructure Protection
    • Biometrics Security and Privacy
    • Cross-Layer Design for Security
    • Certification and Accreditation
    • Data Protection
    • Data Integrity
    • Digital Forensics
    • Database Security and Privacy
    • Defensive Information Warfare
    • Digital Rights Management
    • Distributed Systems Security
    • Denial of Service Protection, Intrusion Detection, Anti-Malware
    • Electronic Commerce
    • Ethical and Legal Implications of Security and Privacy
    • Grid Security
    • E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
    • Human Factors and Human Behavior Recognition Techniques
    • Formal Methods for Security
    • Identity Management
    • Identification, Authentication and Non-repudiation
    • Intellectual Property Protection
    • Information Systems Auditing
    • Information Hiding and Watermarking & Information Survivability
    • Intrusion Detection & Prevention
    • Internet/Intranet Security
    • Insider Threat Protection, Integrity
    • Language-based Security
    • Key Management and Key Recovery
    • Mobile, Ad Hoc and Sensor Network Security
    • Mobile and Wireless Security
    • Multimedia Security ,Operating System Security, Peer-to-Peer Security
    • Monitoring and Surveillance
    • Privacy and Data Protection
    • Performance Evaluations of Protocols & Security Application
    • Risk Evaluation and Security Certification
    • Product Evaluation Criteria and Compliance
    • Secure Software Development Methodologies
    • Reliability and Dependability
    • Security and privacy in Complex Systems
    • Security and Privacy for Big Data
    • Security and Privacy in IT Outsourcing
    • Security and Privacy in Crowdsourcing
    • Security and Privacy in Mobile Systems
    • Security and Privacy in Location-based Services
    • Security and Privacy in Smart Grids
    • Security and Privacy in Pervasive/Ubiquitous Computing
    • Security and Privacy in the Cloud
    • Security and Privacy in Social Networks
    • Security and Privacy Policies
    • Security and Privacy in Web Services
    • Security Deployment
    • Security Area Control
    • Security in Distributed Systems
    • Security Engineering
    • Security Management
    • Security Information Systems Architecture
    • Security Protocols
    • Security Metrics and Measurement
    • Security Verification and Validation
    • Security requirements
    • Service and Systems Design and QoS Network Security
    • Sensor and Mobile Ad Hoc Network Security
    • Trusted Computing
    • Software Security
    • Ubiquitous Computing Security
    • Trust management and Reputation Systems
    • Ubiquitous Computing Security
    • Wireless Network Security
    • Risk/Vulnerability Assessment
    • Virtualization Security, VoIP Security, Web 2.0 Security
    • Network Security
    • Management of Computing Security
    • Peer-to-Peer Security
    • Organizational Security Policies
    • Privacy Enhancing Technologies
    • Personal Data Protection for Information Systems
  • Automated Software Engineering
    • Component-based service-oriented systems
    • Automated reasoning techniques
    • Computer-supported cooperative work
    • Cloud computing
    • Data mining for software engineering
    • Configuration management
    • Empirical software engineering
    • Domain modeling and meta-modeling
    • Knowledge acquisition and management
    • Human-computer interaction
    • Maintenance and evolution
    • Mobile app development
    • Program synthesis & transformations, automated defect repair
    • Model-driven development
    • Reverse engineering and re-engineering
    • Program comprehension
    • Requirements engineering
    • Recommender systems for software engineering
    • Software analysis
    • Specification languages
    • Software product line engineering
    • Software architecture and design
    • Software security and trust; data privacy
    • Software visualization
    • Testing, verification, and validation

Past Events

Important

Please, check "International Conference on Automated Software Engineering and Communication Security (ICASECS)" official website for possible changes, before making any traveling arrangements

Event Categories

Technology: Artificial Intelligence (AI), Communication Networks, Data management, Information Technology (IT), Software & Applications, Software engineering

Other Events with Similar Categories

Other Events with Similar Location or Organizer

Featured Conferences & Exhibitions