QSIC 2015 - International Conference on Quality Software
Topics/Call fo Papers
Starting from 2015, the SERE conference (International Conference on Software Security and Reliability) and the QSIC conference (International Conference on Quality Software) will be combined as a single conference QRS, with Q representing Quality, R for Reliability, and S for Security. The conference is sponsored by the IEEE Reliability Society. It draws engineers and scientists from both industry and academia to present their on-going work, relate their research outcomes and experiences, and discuss the best and most efficient techniques for the development of reliable, secure, and trustworthy systems. This presents an excellent opportunity for the academic community to become more aware of subject areas critical to the software industry, as practitioners bring their needs to the table. The 2015 conference will be held from August 3 to 5 in Vancouver, Canada.
TOPICS OF INTEREST
◆ Reliability, security, availability, and safety of software systems
◆ Software testing, verification and validation
◆ Program debugging and comprehension
◆ Information and software assurance
◆ Fault tolerance for software reliability improvement
◆ Modeling, prediction, simulation, and evaluation
◆ Metrics, measurements, and analysis
◆ Secure and reliable storage
◆ Software penetration and protection
◆ Software vulnerabilities
◆ Formal methods
◆ Malware detection and analysis
◆ Intrusion detection and prevention
◆ Operating system security and reliability
◆ Mobile and smartphone applications
◆ Internet of things and cloud computing
◆ Information and knowledge management
◆ Benchmark, tools, and empirical studies
TOPICS OF INTEREST
◆ Reliability, security, availability, and safety of software systems
◆ Software testing, verification and validation
◆ Program debugging and comprehension
◆ Information and software assurance
◆ Fault tolerance for software reliability improvement
◆ Modeling, prediction, simulation, and evaluation
◆ Metrics, measurements, and analysis
◆ Secure and reliable storage
◆ Software penetration and protection
◆ Software vulnerabilities
◆ Formal methods
◆ Malware detection and analysis
◆ Intrusion detection and prevention
◆ Operating system security and reliability
◆ Mobile and smartphone applications
◆ Internet of things and cloud computing
◆ Information and knowledge management
◆ Benchmark, tools, and empirical studies
Other CFPs
Last modified: 2014-12-25 00:23:30