A body of knowledge containing laws, axioms and provable theories relating to some aspect of system security.
Event
CASES 2016
Compilers, Architecture and Synthesis of Embedded Systems Conference (CASES 2016) Part of Embedded Systems Week (ESWeek  is the premier event covering all aspects of embedded systems and software.) About CASES:
Submitted by Anonymous on March 25th, 2016
Event
RTCSA 2016
RTCSA 2016: The 22nd IEEE International Conference on Embedded and Real-Time Computing Systems and Applications RTCSA 2016 is going to be held in Daegu, South Korea and organized by DGIST. The RTCSA conference series carry on with the tradition and bring together researchers and developers from academia and industry for advancing the technology of embedded and real-time systems and their emerging applications including the Internet of things and cyber-physical systems.
Submitted by Anonymous on March 11th, 2016
Event
EMSOFT 2016
 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE (EMSOFT) The ACM SIGBED International Conference on Embedded Software (EMSOFT) brings together researchers and developers from academia, industry, and government to advance the science, engineering, and technology of embedded software development. EMSOFT 2016 is part of the Embedded Systems Week.
Submitted by Anonymous on March 8th, 2016
Event
TIME 2016
CALL FOR PAPERS  23rd International Symposium on Temporal Representation and Reasoning (TIME 2016) Aim
Submitted by Anonymous on February 24th, 2016
The 14th IEEE Symposium on Embedded Systems for Real-Time Multimedia (ESTIMedia 2016)  6th – 7th Oct 2016 |  Pittsburgh, USA | http://www.estimedia.org/ The IEEE ESTIMedia’16 is organized as a part of the Embedded Systems Week 2016 
Submitted by Anonymous on February 24th, 2016
Event
CONCUR 2016
The 27th International Conference on Concurrency Theory (CONCUR2016) The 27th International Conference on Concurrency Theory will take place in Québec City, Canada, 23-26 August 2016. The event will be co-located with the 13th QEST International Conference on Quantitative Evaluation of SysTems (QEST) and the 14th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS). 
Submitted by Anonymous on February 15th, 2016

The National Institute of Standards and Technology (NIST) launched the 2016 Global City Teams Challenge (GCTC; see http://www.nist.gov/cps/sagc.cfm) with a kickoff meeting on November 12-13, 2015, in Gaithersburg, MD. This meeting brought together city planners and representatives from technology companies, academic institutions, and non-profits with the aim of fostering teams that will contribute to an overall vision for Smart and Connected Communities (S&CC) - effectively integrating networked information systems, sensing and communication devices, data sources, decision-making, and physical infrastructure to transform communities by improving quality of life, environmental health, social well-being, educational achievement, or overall economic growth and stability.

NIST's GCTC builds upon the National Science Foundation's (NSF) longstanding investments in cyber-physical systems (CPS). NSF established the CPS program in 2008 to develop the principles, methodologies, and tools needed to deeply embed computational intelligence, communications, and control, along with new mechanisms for sensing, actuation, and adaptation, into physical systems. The NSF CPS program, which today includes the participation of the U.S. Department of Homeland Security, U.S. Department of Transportation, National Aeronautics and Space Administration, and National Institutes of Health, has funded a strong portfolio of projects that together have pushed the boundaries of fundamental knowledge and systems engineering in core science and technology areas needed to support an ever-growing set of application domains. CPS investments are enabling systems that are central to emerging S&CC infrastructure and services, including in areas such as intelligent transportation systems (ground, aviation, and maritime), building control and automation, advanced manufacturing (including cyber-manufacturing), healthcare and medical devices, and the burgeoning Internet of Things (IoT). Dependability, security, privacy, and safety continue to be central priorities for the program in pursuing the vision of a world in which CPS dramatically improve quality of life. Along the way, the CPS program has also nurtured a vibrant CPS research community.

With this Dear Colleague letter (DCL), NSF is announcing its intention to fund EArly-Concept Grants for Exploratory Research (EAGER) proposals to support NSF researchers participating in the NIST GCTC, with the goal of pursuing novel research on the effective integration of networked computing systems and physical devices that will have significant impact in meeting the challenges of Smart and Connected Communities. Researchers must be members of, or be seeking to establish, GCTC teams that build upon the results of previous or active NSF-funded projects, and must provide evidence of active team membership and participation as part of the submission. [Note that, while this DCL is aligned with NSF’s broader efforts in Smart and Connected Communities (see http://www.nsf.gov/publications/pub_summ.jsp?ods_key=nsf15120), a key requirement for this DCL is active participation in a GCTC team.] Proposals should emphasize the fundamental research inherent to the real-world problems being addressed; the manner in which the proposed solutions will be adopted by one or more local communities; and the potential challenges with respect to both research and deployment. Successful proposals will quantify the magnitude of potential societal impacts; and will result in transformative, long-term benefits rather than incremental advances. Finally, proposals must address why the work is appropriate for EAGER funding (see details below), including what key risks will be mitigated to facilitate future high-reward advances and why the timing of the project will maximize the potential for success.

The deadline for submission of EAGERs is April 1, 2016, but earlier submissions are encouraged, and decisions will be made on a first-come, first-serve basis.

Submission of EAGER proposals will be via Fastlane or Grants.gov. EAGER submissions should follow the NSF's Grant Proposal Guide (GPG) II.D.2 (see http://www.nsf.gov/publications/pub_summ.jsp?ods_key=gpg). (As noted in the GPG, EAGER is a funding mechanism for supporting exploratory work in its early stages on untested, but potentially transformative, research ideas or approaches. This work may be considered especially "high-risk/high-reward," for example, in the sense that it involves radically different approaches, applies new expertise, or engages novel disciplinary or interdisciplinary perspectives.)

An investigator may be included in only one submission in response to this DCL; if more than one is submitted, only the first one will be considered.

For further information, please contact the cognizant CPS program directors:

  • David Corman, CISE/CNS/CPS, dcorman@nsf.gov
  • Kishan Baheti, ENG/ECCS/EPCN, rbaheti@nsf.gov
  • Sylvia Spengler, CISE/IIS/CPS, sspengle@nsf.gov
  • Gurdip Singh, CISE/CNS/CSR, gsingh@nsf.gov
General Announcement
Not in Slideshow
Submitted by Anonymous on February 12th, 2016
Event
IWCMC 2016
**** Due to several requests, the deadline is extended to Feb. 29, 2016 (Final) *** CALL FOR PAPERS The 12th International Wireless Communications and Mobile Computing Conference (IWCMC 2016) Paphos, Cyprus | September 5-9, 2016 | http://iwcmc.org/2016 Mobile Computing Symposium (http://swimsys.cs.odu.edu/iwcmc-mc/2016/)
Submitted by Anonymous on February 11th, 2016
The 35th International Conference on Computer Safety, Reliability and Security (SAFECOMP2016) ABOUT SAFECOMP
Submitted by Anonymous on February 3rd, 2016
Event
SEsCPS 2016
2nd INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING FOR SMART CYBER-PHYSICAL SYSTEMS (SEsCPS) In conjunction with ICSE 2016 May 14-22, 2016 | Austin, TX, USA) | http://d3s.mff.cuni.cz/conferences/sescps2016/ INTRODUCTION
Submitted by Anonymous on February 3rd, 2016
Subscribe to Science of Security