<html><head><meta http-equiv="Content-Type" content="text/html; charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><br class=""><div><div class=""><div style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div style="" class=""><div style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div class=""><div class=""><div style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><div class="CmsItem CmsArticle cleared" data-fragment="15345278" style="box-sizing: inherit; overflow: hidden; position: relative;"><div class="cleared CmsArticle_body" style="box-sizing: inherit;"><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class=""><em class="journalName" style="box-sizing: inherit;">EURASIP Journal on Information Security</em> welcomes submissions to the special issue on Recent Advances in Software Security. </p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class="">The security of software has become crucial given the impact of the attacks on organizations, individuals, and communities. Despite the increased awareness and concerns about threats, current state of the art of software engineering practices are inadequate. Building blocks such as cryptography and protocols are necessary but not sufficient to ensure the security of software. There has been progress in developing methods and tools to engineer secure software and in empirically studying the domain to identify best practices and phenomena. <em style="box-sizing: inherit;" class="">EURASIP Journal on Information Security</em> calls for a special issue on Recent Advances in Software Security. This Special Issue aims to provide an international forum for both researchers and industrial practitioners to share the latest advances in the state of the art and practice of software security and to identify emerging research topics.</p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class="">Potential topics include but are not limited to:<br style="box-sizing: inherit;" class=""></p><ul style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px;" class=""><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">Data-driven secure software development</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">challenges for agile development of secure software</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">experience with secure DevOps</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">incremental development of cyber-physical systems</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">secure software development training and education</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">tools supporting incremental secure software development</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">usability of agile secure software development</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">security awareness for software developers</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">security and robustness testing in agile development</li></ul><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class=""><span style="box-sizing: inherit; font-weight: 700;" class="">Submission Instructions</span></p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class="">Before <a href="https://www.editorialmanager.com/jins/default.aspx" target="_self" class="is-external" style="box-sizing: inherit; color: rgb(142, 37, 85);">submitting your manuscript</a>, please ensure you have carefully read the <a href="https://jis-eurasipjournals.springeropen.com/submission-guidelines" target="_blank" style="box-sizing: inherit; color: rgb(142, 37, 85);" class="">submission guidelines</a>for <em class="journalName" style="box-sizing: inherit;">EURASIP Journal on Information Security</em>. The complete manuscript should be submitted through the <em class="journalName" style="box-sizing: inherit;">EURASIP Journal on Information Security</em> submission system. To ensure that you submit to the correct special issue please select the appropriate special issue in the drop-down menu upon submission. In addition, indicate within your cover letter that you wish your manuscript to be considered as part of the special issue on Cyber Security Intelligence and Analytics. All submissions will undergo rigorous peer review and accepted articles will be published within the journal as a collection.</p><p style="box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class=""><font color="#333333" face="sans-serif" class="">Submission link: <a href="https://www.editorialmanager.com/jins/default.aspx" class="">https://www.editorialmanager.com/jins/default.aspx</a></font></p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class=""><span style="box-sizing: inherit; font-weight: 700;" class="">Deadline for submissions: 21 October 2018</span></p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class=""><span style="box-sizing: inherit; font-weight: 700;" class="">Lead Guest Editor </span></p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class="">Lotfi ben Othmane, Iowa State University, USA</p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class=""><span style="box-sizing: inherit; font-weight: 700;" class="">Guest Editor</span></p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class="">Edgar Weippl, SBA Research, Austria<br style="box-sizing: inherit;" class=""><br style="box-sizing: inherit;" class=""></p><p style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px; margin-bottom: 1.5em;" class="">Submissions will also benefit from the usual advantages of open access publication: </p><ul style="caret-color: rgb(51, 51, 51); color: rgb(51, 51, 51); font-family: sans-serif; box-sizing: inherit; margin-top: 0px;" class=""><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">Rapid publication: Online submission, electronic peer review and production make the process of publishing your article simple and efficient </li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">High visibility and international readership in your field: Open access publication ensures high visibility and maximum exposure for your work - anyone with online access can read your article </li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">No space constraints: Publishing online means unlimited space for figures, extensive data and video footage</li><li style="box-sizing: inherit; margin-bottom: 0.4em;" class="">Authors retain copyright, licensing the article under a Creative Commons license: articles can be freely redistributed and reused as long as the article is correctly attributed </li></ul></div></div><div class=""><br class=""></div></div></div></div><br class=""></div></div><br class=""></div></div></div><br class=""></body></html>