Call for Papers

Paper preparation and submission instructions: CLICK HERE

Important Dates: CLICK HERE

The papers accepted at RSDA 2022 will be included in the ISSRE Supplemental Proceedings as well as in the ISSRE-W volume on IEEE Xplore.

Scope of RSDA

Computer systems are the basis for daily human activities and, more importantly, they play a key role in a variety of critical domains. Assessing dependability properties of computer systems is today an important concern for engineers and practitioners.

The analysis of textual/numeric data and log files produced under real workload conditions by applications, systems, and networks, intrusion detection systems, monitors and issue-trackers plays a key role for dependability assessment. Data analysis is crucial in a variety of engineering tasks, such as measuring availability and resiliency of a system, characterizing failures, gaining insights into the progression of security attacks, designing mitigation means and countermeasures.

Academia and industry widely recognize the inherent potential of reliability and security data analysis for assessing resiliency of computer systems and operational networks, and improving the engineering process. Data analysis in these specific areas poses many challenging research questions due to the heterogeneity, volume and velocity of the collected data, the lack of systematic end-to-end analysis procedures, the increasing diversity of analysis objectives and emerging application domains in critical areas.

RSDA addresses, but it is not limited to, the following research issues/topics:

  • Event logs and security-related data collection, processing and management;
  • Monitoring and analysis of resource utilization metrics;
  • Dependability and security monitoring, measurement and modeling;
  • Anomaly detection;
  • Analysis of attacks, defenses, and countermeasures;
  • Adversarial machine learning:
  • Security Information and Event Management (SIEM);
  • Data visualization;
  • Intrusion detection and prevention;
  • Denial-of-Service and botnet analysis, detection, and mitigation;
  • Application security status monitoring;
  • Behavior-based fraud and threat detection;
  • Insider threat and functional misuse detection;
  • Error/Failure detection and characterization;
  • Failure prediction and recovery techniques;
  • Failure data analysis and field studies;
  • Fault and intrusion tolerance;
  • Defect analysis and Software Reliability Growth Models (SRGM);
  • Dependability and security forensics;
  • Generation of synthetic data sets for benchmarking dependability/security techniques;
  • Dependability and security analysis of large datasets and production systems;
  • Machine Learning for security.

Relevant application areas include, but are not limited to:

  • Application dependability and security;
  • Distributed, parallel, clustered and grid systems;
  • Critical infrastructures protection;
  • Cloud;
  • Mobile systems and services;
  • Middleware, database and transactional systems;
  • Operating systems;
  • Web-based information systems;
  • Fog and Edge computing;
  • Internet of Things.