AISSS-bg-image

Artificial Intelligence for Secure Software and Systems

IN CONJUNCTION WITH
THE 11TH IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES (BDCAT2024)
THE 17TH IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2024)


SUBMIT YOUR PAPER

  Days  
 Hours 
Minutes
Seconds
bu-logo
uqc-logo

SCOPE

Artificial Intelligence (AI) has revolutionized various industries, including cybersecurity. As cyber threats continue to evolve, AI has emerged as a powerful tool for enhancing the security of software and systems. This workshop aims to bring together researchers, practitioners, and industry experts to discuss the latest advancements, challenges, and opportunities in leveraging AI for secure software and systems.

We invite proposals for workshops to be held in conjunction with the 11th IEEE/ACM International Conference on Big Data Computing, Applications, and Technologies (BDCAT 2024), with a specific focus on "Artificial Intelligence for Secure Software and Systems".

Workshop proposals should emphasize innovative research topics and foster discussions on the latest developments in the intersection of Artificial Intelligence and security for software and systems.

TOPICS

  • Machine learning for threat detection and prevention in software and systems
  • AI-driven security analytics in software repositories
  • AI-based Techniques for Software Quality, Reliability, and Security
  • Secure AI deployment in software and systems
  • Privacy-preserving AI techniques for software and systems
  • Fault Tolerance for Software Reliability Improvement
  • Secure software development methodologies
  • AI-powered security testing and evaluation
  • Ethical considerations in AI for secure software and systems
  • Metrics, Measurements, and Analysis
  • Secure and Reliable Storage
  • Methodology for secure code development
  • Risk management and testing strategies to improve security
  • Security engineering processes, from requirements to maintenance
  • Software ecosystem and software supply chain security
  • Distributed systems design and implementation for security
  • Formal verification and other high-assurance methods for security
  • Automated security analysis of protocols, source code and binaries

PAPER SUBMISSION GUIDELINES

Prospective authors are invited to submit original, high-quality papers of up to six pages (IEEE doublecolumn format) including figures, tables, and references. Papers must be submitted in PDF format through the following submission link: AISSS Submission Link.

All submissions will be peer-reviewed by at least three members of the program committee for originality, technical content, relevance to the workshop topics, and clarity. Accepted papers will be included in the workshop proceedings and submitted to IEEE Xplore.

Authors are invited to strictly adhere to the submission guidlines Authors are invited to submit papers electronically through the following link: BDCAT Submission Link. Submitted manuscripts must represent original unpublished research that is not currently under review for any other conference or journal. Manuscripts are submitted in PDF format and may not exceed ten (10) IEEE-formatted *double-column* pages, including figures, tables, and references. All manuscripts undergo a double-blind peer-review process and will be reviewed and judged on correctness, originality, technical strength, rigor in analysis, quality of results, quality of presentation, and interest and relevance to the conference attendees. Your submission is subject to a determination that you are not under any sanctions by IEEE.

At least one author of each paper must be registered for the conference for the paper to be published in the proceedings. The conference proceedings will be published by the IEEE and made available online via the IEEE Xplore Digital Library and ACM Digital Library.

Download the IEEE conference templates (LaTeX , Microsoft Word or Overleaf) here.

ORGANIZATION TEAM

  • ORGANIZERS COMMITTEE
    • Yasir Malik, Bishops University, Canada
    • Fehmi Jaafar, Quebec University at Chicoutimi, Canada
    • Haifa Nakouri, Quebec University at Chicoutimi, Canada
  • PROGRAM CHAIR
    • Haifa Nakouri, Quebec University at Chicoutimi, Canada
    • Yasir Malik, Bishops University, Canada
  • TECHNICAL COMMITTEE
    • Darine Ameyed, Sherbrooke University, Canada
    • Kevin Bouchard, Quebec University at Chicoutimi, Canada
    • Hamdi Ben Abdessalem, Quebec University at Chicoutimi, Canada
    • Pierre Martin Tardif, Sherbrooke University, Canada
    • Yann-Gaël Guéhéneuc, Concordia University, Canada
    • Sherif Saad Ahmed, University of Windsor, Canada
    • Irfan Ahmed, Virginia Commonwealth University, USA
    • Usman Tariq, Prince Sattam bin Abdulaziz University, KSA
    • Issa Traoré, university of Victoria, Canada
    • Stefan D. Bruda, Bishops University, Canada
    • Saqib Hakak, University of New Brunswick Canada
    • Arash Habibi Lashkari, York University, Canada
    • Ghalib Asadullah Shah, Air University, Pakistan
    • Muneer Ahmad, University of Roehampton, UK
    • Ali Kashif Bashir, Manchester Metropolitan University, UK
    • Sajjad Hussain Chauhdary, University of Jeddah
    • Atta ur Rehman Khan, Ajman University, UAE
    • Alptekin Küpcü, Koc University, Türkiye
    • Chiheb Eddine Ben N'Cir, University of Jeddah, KSA
    • Kim Il-kyong, Kyungpook National University, South Korea
    • Basit Shahzad, National University of Modern Languages, Pakistan
    • Bessam Abdulrazak, Sherbrooke University, Canada
    • Ali Ismail Awad, United Arab Emirates University, UAE
  • WEB MASTER
    • Abdullah Khan, Bishops University, Canada

PROGRAM

Coming Soon

REGISTRATION

Coming Soon

Contact US

  • Yasir Malik: ymalik@ubishops.ca
  • Fehmi Jaafar: fjaafar@uqac.ca

EVENT LOCATION

The University of Sharjah
Dubai, UAE

IMPORTANT DATES

  • Submission Date: 25th August 2024
  • Notification to Authors: 6th October 2024
  • Camera-ready & Registration: 20th October 2024
BU-logo UQC-logo