Human Factors and Human Behavior Recognition Techniques
Formal Methods for Security
Identity Management
Identification, Authentication and Non-repudiation
Intellectual Property Protection
Information Systems Auditing
Information Hiding and Watermarking & Information Survivability
Intrusion Detection & Prevention
Internet/Intranet Security
Insider Threat Protection, Integrity
Language-based Security
Key Management and Key Recovery
Mobile, Ad Hoc and Sensor Network Security
Mobile and Wireless Security
Multimedia Security ,Operating System Security, Peer-to-Peer Security
Monitoring and Surveillance
Privacy and Data Protection
Performance Evaluations of Protocols & Security Application
Risk Evaluation and Security Certification
Product Evaluation Criteria and Compliance
Secure Software Development Methodologies
Reliability and Dependability
Security and privacy in Complex Systems
Security and Privacy for Big Data
Security and Privacy in IT Outsourcing
Security and Privacy in Crowdsourcing
Security and Privacy in Mobile Systems
Security and Privacy in Location-based Services
Security and Privacy in Smart Grids
Security and Privacy in Pervasive/Ubiquitous Computing
Security and Privacy in the Cloud
Security and Privacy in Social Networks
Security and Privacy Policies
Security and Privacy in Web Services
Security Deployment
Security Area Control
Security in Distributed Systems
Security Engineering
Security Management
Security Information Systems Architecture
Security Protocols
Security Metrics and Measurement
Security Verification and Validation
Security requirements
Service and Systems Design and QoS Network Security
Sensor and Mobile Ad Hoc Network Security
Trusted Computing
Software Security
Ubiquitous Computing Security
Trust management and Reputation Systems
Ubiquitous Computing Security
Wireless Network Security
Risk/Vulnerability Assessment
Virtualization Security, VoIP Security, Web 2.0 Security
Network Security
Management of Computing Security
Peer-to-Peer Security
Organizational Security Policies
Privacy Enhancing Technologies
Personal Data Protection for Information Systems
Automated Software Engineering
Component-based service-oriented systems
Automated reasoning techniques
Computer-supported cooperative work
Cloud computing
Data mining for software engineering
Configuration management
Empirical software engineering
Domain modeling and meta-modeling
Knowledge acquisition and management
Human-computer interaction
Maintenance and evolution
Mobile app development
Program synthesis & transformations, automated defect repair
Model-driven development
Reverse engineering and re-engineering
Program comprehension
Requirements engineering
Recommender systems for software engineering
Software analysis
Specification languages
Software product line engineering
Software architecture and design
Software security and trust; data privacy
Software visualization
Testing, verification, and validation
Past Events
International Conference on Automated Software Engineering and Communication Security (ICASECS 2018) - 19-20 Mar 2018, Hilton Osaka, Japan (71711)
Important
Please, check "International Conference on Automated Software Engineering and Communication Security (ICASECS)" official website for possible changes, before making any traveling arrangements
Event Categories
Technology: Artificial Intelligence (AI), Communication Networks, Data management, Information Technology (IT), Software & Applications, Software engineering