Call For Papers:
To submit your work via here
As applications are one of the most critical assets, application security aims to take proper actions to improve the security of an application by identifying and fixing application vulnerabilities. Application intelligence plays an important role in designing an appropriate security mechanism; thus application intelligence security gains increasing attention. With the adoption of blockchain technology, how to benefit security by combining blockchains with application intelligence become an emerging research topic.
This workshop attempts to provide a platform for professionals from academia and industry to discuss challenges and potential solutions in this direction. We seek submissions describing either theoretical or practical solutions in relation to application intelligence security and blockchain security. Topics of interest include, but are not limited to:
- Blockchain Platforms
- Blockchain-based Applications
- Cryptocurrency Analysis
- Data and System Integrity
- Data Protection
- Database Security
- Decentralized Application Development
- Formal Method
- Intrusion Detection
- Smart Contracts
- Trust and Privacy of Applications
- Vulnerability Analysis
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other venue with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Submissions must be anonymous, with no author names, affiliations, acknowledgement or obvious references.
Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 18 pages (incl. references) for the main part (reviewers are not required to read beyond this limit) and 30 pages in total. Authors of accepted papers must guarantee that their paper will be presented at the conference and must make a full version of their paper available online. There will be a best paper award.
The accepted papers will have post-proceedings published by Springer.
To make a submission via here
A special issue for the best papers selected from this workshop will be published in IJIS, Springer (https://www.springer.com/computer/security+and+cryptology/journal/10207, IF = 1.658).
If there is any question, please contact us at: email@example.com