SlideShare a Scribd company logo
7th
International Conference on Software Security (ICSS 2021)
November 27 ~ 28, 2021, Dubai, UAE
https://cndc2021.org/icss/index
Scope
7th
International Conference on Software Security (ICSS 2021) is traditionally, security in
software has been thought to be something that can be easily added on as a patch, post-
development, and sometimes even after the deployment of the software. According to the US-
Computer Emergency Readiness Team (US-CERT), “most successful attacks result from
targeting and exploiting known, non-patched software vulnerabilities and insecure software
configurations, many of which are introduced during design and code.” Hence, it is imperative
that secure design, coding and testing principles as well as deployment and maintenance are
thoroughly embedded in the software development life cycle. At the same time, software security
is very inter-disciplinary, as software is being developed for a variety of applications – web,
Internet, database, single and distributed computer systems, etc.
In the above context, the Fifth International Conference on Software Security brings together
researchers, faculty, students and industry professionals who are experts in different domains of
computer and information security, but all leading to the design, development, deployment and
maintenance of secure software. We invite papers that are both theoretical as well as practical in
nature, from both academia and industry. Some of the topics of interest (but not limited to) are:
Topics of Interest
 Software Security Attacks and Solutions
 Static and Dynamic Code Analysis for Software Security
 Validation, Verification and Testing for Software Security
 Virtualization and Cloud Computing for Software Security
 Cryptography for Software Security
 Firewalls and Intrusion Detection/Prevention Systems for Software Security
 Software Penetration and Protection
 Measurements and Metrics for Software Security
 Secure Software Development Life cycle
 Principles and Models for Secure Software Design
 Secure Coding Standards and Their Implementation
 Software Security for Wireless and Mobile Applications
 Software Security for Database Systems
 Software Security for Web and Internet Applications
 Security of Open Source Software
 Software Threats and Vulnerabilities
 Risk Analysis for Software Security
Paper Submission
Authors are invited to submit papers through the conference Submission System by November
14, 2021 (Final Call). Submissions must be original and should not have been published
previously or be under consideration for publication while being evaluated for this conference.
The proceedings of the conference will be published by Computer Science Conference
Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).
Selected papers from ICSS 2021, after further revisions, will be published in the special issue of
the following journals
 International Journal of Computer Networks & Communications (IJCNC) -
ERAIndexed, SCOPUS Indexed
 International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed
 International Journal On Cryptography And Information Security (IJCIS)
 International Journal of Security, Privacy and Trust Management (IJSPTM)
 International Journal of Software Engineering & Applications (IJSEA)
 Information Technology in Industry (ITII)New
- ESCI(WOS) Indexed
Important Dates
Third Batch : (Submissions after October 04, 2021)
 Submission Deadline : November 14, 2021(Final Call)
 Authors Notification : November 22, 2021
 Registration & Camera-Ready Paper Due : November 24, 2021
Contact Us
Here's where you can reach us : icss@cndc2021.org or icssconfe@yahoo.com

More Related Content

What's hot

Ijseea
IjseeaIjseea
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
MiajackB
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
MiajackB
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
MiajackB
 
Ijseea
IjseeaIjseea
Ijseea
IjseeaIjseea
Ijseea
IjseeaIjseea
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali
 
Ijseea
IjseeaIjseea
Is Security Optional20100608
Is Security Optional20100608Is Security Optional20100608
Is Security Optional20100608
aljapaco
 
Ijseea
IjseeaIjseea
Ijseea
IjseeaIjseea
Ijseea
IjseeaIjseea
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
Mustafa TOPÇU
 
Ijseea
IjseeaIjseea
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
MiajackB
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6
Perri Nejib
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
MiajackB
 

What's hot (19)

Ijseea
IjseeaIjseea
Ijseea
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
Ijseea
IjseeaIjseea
Ijseea
 
Ijseea
IjseeaIjseea
Ijseea
 
Ijseea
IjseeaIjseea
Ijseea
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Ijseea
IjseeaIjseea
Ijseea
 
Is Security Optional20100608
Is Security Optional20100608Is Security Optional20100608
Is Security Optional20100608
 
Ijseea
IjseeaIjseea
Ijseea
 
Ijseea
IjseeaIjseea
Ijseea
 
Ijseea
IjseeaIjseea
Ijseea
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
 
Ijseea
IjseeaIjseea
Ijseea
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 
International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)International Journal of Network Security &Its Applications (IJNSA)
International Journal of Network Security &Its Applications (IJNSA)
 
Perri Nejib_bio_March_6
Perri Nejib_bio_March_6Perri Nejib_bio_March_6
Perri Nejib_bio_March_6
 
International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA) International Journal of Information Security and Applications(IJISA)
International Journal of Information Security and Applications(IJISA)
 

Similar to CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)

FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
IJDKP
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
ClaraZara1
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
pijans
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
MiajackB
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
ijasuc
 
Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochi
amallblitz0
 
Ijseea
IjseeaIjseea
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
CSCJournals
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ijesajournal
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
ijcisjournal
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
IJNSA Journal
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
IRJET Journal
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
ijasuc
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
IJNSA Journal
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
IJECEIAES
 

Similar to CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021) (20)

FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
 
8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)8th International Conference on Networks and Security (NSEC 2024)
8th International Conference on Networks and Security (NSEC 2024)
 
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
 
International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA) International Journal of Software Engineering & Applications (IJSEEA)
International Journal of Software Engineering & Applications (IJSEEA)
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
Cyber security course in Kerala , Kochi
Cyber security course in Kerala ,  KochiCyber security course in Kerala ,  Kochi
Cyber security course in Kerala , Kochi
 
Ijseea
IjseeaIjseea
Ijseea
 
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENTESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
ESSENTIAL ACTIVITIES FOR SECURE SOFTWARE DEVELOPMENT
 
15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)15th International Conference on Network Security & Applications (CNSA 2022)
15th International Conference on Network Security & Applications (CNSA 2022)
 
Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...Call for Papers - 15th International Conference on Network Security & Applica...
Call for Papers - 15th International Conference on Network Security & Applica...
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...Call for Papers - International Journal of Network Security & Its Application...
Call for Papers - International Journal of Network Security & Its Application...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...Submit Your Research Articles - International Journal of Network Security & I...
Submit Your Research Articles - International Journal of Network Security & I...
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
 

More from ijp2p

COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
ijp2p
 
International Journal of Peer to Peer Networks .docx
International Journal of Peer to  Peer Networks .docxInternational Journal of Peer to  Peer Networks .docx
International Journal of Peer to Peer Networks .docx
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
ijp2p
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...
ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
ijp2p
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...
ijp2p
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
ijp2p
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdf
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...
ijp2p
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
ijp2p
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
ijp2p
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
ijp2p
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
ijp2p
 

More from ijp2p (20)

COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSCOMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
International Journal of Peer to Peer Networks .docx
International Journal of Peer to  Peer Networks .docxInternational Journal of Peer to  Peer Networks .docx
International Journal of Peer to Peer Networks .docx
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdf
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
Las Vegas Warehouse
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have oneISPM 15 Heat Treated Wood Stamps and why your shipping must have one
ISPM 15 Heat Treated Wood Stamps and why your shipping must have one
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 

CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)

  • 1. 7th International Conference on Software Security (ICSS 2021) November 27 ~ 28, 2021, Dubai, UAE https://cndc2021.org/icss/index Scope 7th International Conference on Software Security (ICSS 2021) is traditionally, security in software has been thought to be something that can be easily added on as a patch, post- development, and sometimes even after the deployment of the software. According to the US- Computer Emergency Readiness Team (US-CERT), “most successful attacks result from targeting and exploiting known, non-patched software vulnerabilities and insecure software configurations, many of which are introduced during design and code.” Hence, it is imperative that secure design, coding and testing principles as well as deployment and maintenance are thoroughly embedded in the software development life cycle. At the same time, software security is very inter-disciplinary, as software is being developed for a variety of applications – web, Internet, database, single and distributed computer systems, etc. In the above context, the Fifth International Conference on Software Security brings together researchers, faculty, students and industry professionals who are experts in different domains of computer and information security, but all leading to the design, development, deployment and maintenance of secure software. We invite papers that are both theoretical as well as practical in nature, from both academia and industry. Some of the topics of interest (but not limited to) are: Topics of Interest  Software Security Attacks and Solutions  Static and Dynamic Code Analysis for Software Security  Validation, Verification and Testing for Software Security  Virtualization and Cloud Computing for Software Security  Cryptography for Software Security  Firewalls and Intrusion Detection/Prevention Systems for Software Security  Software Penetration and Protection  Measurements and Metrics for Software Security  Secure Software Development Life cycle  Principles and Models for Secure Software Design  Secure Coding Standards and Their Implementation  Software Security for Wireless and Mobile Applications  Software Security for Database Systems  Software Security for Web and Internet Applications  Security of Open Source Software  Software Threats and Vulnerabilities  Risk Analysis for Software Security
  • 2. Paper Submission Authors are invited to submit papers through the conference Submission System by November 14, 2021 (Final Call). Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from ICSS 2021, after further revisions, will be published in the special issue of the following journals  International Journal of Computer Networks & Communications (IJCNC) - ERAIndexed, SCOPUS Indexed  International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed  International Journal On Cryptography And Information Security (IJCIS)  International Journal of Security, Privacy and Trust Management (IJSPTM)  International Journal of Software Engineering & Applications (IJSEA)  Information Technology in Industry (ITII)New - ESCI(WOS) Indexed Important Dates Third Batch : (Submissions after October 04, 2021)  Submission Deadline : November 14, 2021(Final Call)  Authors Notification : November 22, 2021  Registration & Camera-Ready Paper Due : November 24, 2021 Contact Us Here's where you can reach us : icss@cndc2021.org or icssconfe@yahoo.com