当前位置:   article > 正文

计算机安全方面的顶级会议_acisp会议

acisp会议
 

Computer Security Conference Ranking and Statistic

Guofei Gu


Ranking

Note:

  • How to judge how good a conference is? In my opinion, here are several criterias:
  • Acceptance ratio: definitely an important metric (maybe the easiest metric that can be quantified), but not the only metric
  • Paper quality and impact: how many classic papers are from this conference? how much impact do papers from this conference have on the community? are they well cited and studied?
  • Committee member quality: what's the quality of TPC members? are they noted researchers in this area? This is an important factor because they will affect the quality of submission (good papers will prefer to submit to the conference with noted researchers in the committee), and control the quality of accepted papers.
  • Attendee/Paper number ratio: another quantified metric. This somehow reflects the influence of this conference on the community
  • Location: a beautiful place has some attraction. In addition, many researchers (but not all) are not very willing to travel to other countries due to limited funding or time (or VISA problem...), so they just submit papers to local conferences. Thus, normally the conferences located in USA are better than in Europe, which is also better than in Asia.
  • History: a conference with a long history may have a good tradition and reputation
  • Industry connection: this somehow reflects the impact on the industry. Normally, conferences on more applied techniques will attract more industry partners (so have more money to improve the quality of conference)
  • This ranking list is only in my opinion. It is not official, nor accurate, only for reference. Some good workshops are also included.
  • For a general CS conference ranking list, please visit here.
Rank 1
S&P(Oakland)
IEEE Symposium on Security and Privacy
CCSACM Conference on Computer and Communications Security
Crypto  International Cryptology Conference
EurocryptEuropean Cryptology Conference
Usenix Security Symposium
NDSSISOC Network and Distributed System Security Symposium
Rank 2ESORICS  European Symposium on Research in Computer Security
RAIDInternational Symposium on Recent Advances in Intrusion Detection
ACSACAnnual Computer Security Applications Conference
DSNThe International Conference on Dependable Systems and Networks
CSFWIEEE Computer Security Foundations Workshop
AsiacryptInternational Conference on the Theory and Application of Cryptology and Information Security
  
Rank 3
TCCTheory of Cryptography Conference

SecureComm

IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks
AsiaCCSACM Symposium on Information, Computer and Communications Security
ACNSInternational Conference on Applied Cryptography and Network Security
NSPWNew Security Paradigms Workshop
PKCInternational Workshop on Public-Key Cryptography
FCFinancial Cryptography
SACACM Symposium on Applied Computing
ACISPAustralasia Conference on Information Security and Privacy
ICICSInternational Conference on Information and Communications Security
ISCInformation Security Conference
ICISCInternational Conference on Information Security and Cryptology
FSEFast Software Encryption
IHWorkshop on Information Hiding
WSPECWorkshop on Security and Privacy in E-commerce
WiSeACM Workshop on Wireless Security
SASNACM Workshop on Security of Ad-Hoc and Sensor Networks
WORMACM Workshop on Rapid Malcode
DRMACM Workshop on Digital Rights Management
SECIFIP International Information Security Conference
SACMATACM Symposium on Access Control Models and Technologies
CHESWorkshop on Cryptographic Hardware and Embedded Systems
CT-RSARSA Conference, Cryptographers' Track
DIMVAGI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment
SRUTIUSENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet
HotSecUSENIX Workshop on Hot Topics in Security
  
others (not ranked)
ISPEC
Information Security Practice and Experience Conference
  
  
  

 


Acceptance Ratio Statistic

Note:

  • This could be the most complete (and accurate?) list of computer security conference statistic you can find on Internet. There are still some blanks in this list. If you have any reliable source of these information (or some other security conferences), please email me (guofei AT cc.gatech.edu). Thanks.
  • You can see from the following statistic, security conferences are becoming harder and harder to get in in the recent five years! And I think this trend will possible continue in the near future.

 

 YearRank 1Rank 2Rank 3
IEEE S&PACM CCS USENIX SecurityNDSSCSFWESORICSRAIDACSACSecureComm AsiaCCSACNS
2007  12.3% (23/187)        
20069.2% (23/251, full paper)
12.7% (32/251)
 14.8%(38/256)
12.3% (22/179)
13.4% (17/127) 24.5%(25/102) 20%(32/160) 17% (16/93) 30%(40/134) 25.4%(32/126)17.7% (33/186) Start from 200615.1% (33/218)
20058.9% (17/192) 15.2% (38/250)14.8% (22/149) 12.9% (16/124) 20.8% (20/96) 17.0% (27/159)20.5% (17/83)22.8% (45/197)22.2% (32/144, full paper)
36.1% (52/144)
Start from 2005
 22.2% (35/158)
200410.2% (19/186)13.9% (35/251)12.0% (22/184) 16.3% (16/98) ? (20/?)17.0% (27/159)13.5% (16/118) 26.1% (35/134)  12.1% (36/297)
200314.5% (19/131)13.8% (35/253)
16.4% (21/128)
20.5% (17/83) ? (17/?)16.7% (19/114)29.5% (13/44)   16.8% (32/191)
Start from 2003
200222.1% (21/95)17.6% (27/153)16.9% (22/130)19.0% (15/79) 27.4% (23/84)19.3% (16/83)25.0% (16/64)    
200117.8% (19/107)17.6% (27/153)28.9% (24/83) 24.2% (16/66)38.9% (21/54) not held21.8% (12/55)    
200013.1% (18/137)21.2% (28/132) 29.4% (15/51) 45.8% (22/48) 25.3% (19/75)53.8% (14/26)    
199924.6% (15/61)19.3% (16/83)  40.4% (19/47) not held? (32/?)    
199816.4% (19/116)20.0% (17/85) 33.3% (15/45)   40.4% (23/57)67.3% (35/52)
Start from 1998
    
199718.2% (20/110)26.6% (17/64)not held   not held     
199629.9% (20/67)32.2% (19/59)     36.2% (21/58)     
199527.8% (20/72)not held   not held     
199429.2% (19/65)44.3% (31/70)not heldStart from 1994 36.6% (26/71)      
199324.3% (17/70)45.0% (27/60)
Start from 1993
   not held     
199223.6% (21/89)    ? (24/?)     
199130.4% (28/92)    not held     
1990  Start from 1990?  ? (?/?)
Start from 1990
     
1989           
1988    Start from 1988      
1987           
198627.5% (25/91)          
198539.7% (25/63)      Start from 1985   
198464.1% (25/39)           
198367.6% (23/34)          
198255.9% (19/34)          
1981           
1980Start from 1980           

Thanks the following people for some information: Mihai Christodorescu, Kevin Almeroth, ...and you.

Oakland:95分,全称IEEE Symposium on Security & Privacy,每年都在Oakland召开。
之所以不简称S&P,是为了跟一个magazine----IEEE Security & Privacy区分开来。被认
为是计算机安全的最高会议,比ACM的CCS更受尊敬。该会自称接受一切与计算机安全的文
章,但我感觉其以应用型为主,对理论性的文章尤其crypto-flavor的文章非常排斥。

CCS:92分,ACM SIGSAC的年会。该会宣称只接受practical papers,然而事实上却是安全
方面最diversified的会议,从纯粹密码学的文章到非常应用性的文章都有。传统上该会议
的politics比较严重,但今年的program committee非常强大,有望使会议质量进一步提高


USENIX Security:91分。USENIX是systems research方面的重要组织,主办了systems方面的若干重要会议,如OSDI(操作系统的第二会议)等。USENIX Security Symposium则是systems security的著名会议,文章基本陷于hardcore systems类型。

NDSS:90分,很好的一个关于网络和分布式系统安全的会议,偏应用型。

ESORICS:88分,欧洲的计算机安全年会。跟CCS一样广泛的范围,包容性甚至更强。

CSFW:85分,一个小型的workshop,然而在安全方面有一定影响。算是为数不多的受到尊
敬的workshops之一。

ACSAC:82分?一个纯粹应用型的安全会议,纯粹到其文章大部分都很难算作传统意义上的
research papers。但其研究的问题都非常的实用和有趣。

SACMAT:82分?Access control方面的一个比较重要的会议。

SecureComm:今年刚刚办起来的网络安全会议。从其program commitee来看,起点很高。
但能有多大影响还要过一段时间才能知道。

***********************************

CRYPTO(95分),EUROCRYPT(94分),ASIACRYPT(90分):IACR的三大年会,在“我知
道的几个理论会议”里已经写过。

TCC(87分):一个新会议,focused on 密码学理论。起点很高,但能有多大影响还要过一段时间才能知道

ACNS(84分?):密码学与网络安全结合的会议。历史很短,但接受率颇低(百分之十五
以下)。

  转自http://www-static.cc.gatech.edu/~guofei

声明:本文内容由网友自发贡献,不代表【wpsshop博客】立场,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:https://www.wpsshop.cn/w/码创造者/article/detail/803481
推荐阅读
相关标签
  

闽ICP备14008679号