您的位置:首页 > 理论基础 > 计算机网络

网络安全相关会议排名

2012-11-23 09:29 459 查看

Computer Security Conference Ranking

Ranking

Note:

How to judge how good a conference is? In my opinion, hereare several criteria:

Acceptance ratio:definitely an important metric (maybe the easiest metric that can bequantified), but not the only metric
Paper quality and impact:how many classic papers are from this conference? how much impact dopapers from this conference have on the community? are they well citedand studied?
Committee member quality:what's the quality of TPC members? are they noted researchers in thisarea? This is an important factor because they will affect the qualityof submission (good papers will prefer to submit to the conference
withnoted researchers in the committee), and control the quality ofaccepted papers.
Attendee/Paper number ratio:another quantified metric. This somehow reflects the influence of thisconference on the community
Location: abeautiful place has some attraction. In addition, many researchers (butnot all) are not very willing to travel to other countries due tolimited funding or time (or VISA problem...), so they just submitpapers to local conferences.
Thus, normally the conferences located inUSA are better than in Europe, which is also better than in Asia.
History:a conference with a long history may have a good tradition andreputation
Industry connection:this somehow reflects the impact on the industry. Normally, conferenceson more applied techniques will attract more industry partners (so havemore money to improve the quality of conference)

Combining the first few criteria mentioned above, Dr. Jianying Zhouproposed a more quantitative metric (Conference Impact Factor, CIF).Please check out his pagehere.
This ranking list is only in my opinion. It is notofficial, nor accurate, only for reference. Some good workshops arealso included.
I'm probably biased because I'm mainly a network/systemsecurity researcher. Notify me if you have different views, or you findsignificant conferences missing/bias. I'm more than happy to hear from you.
Some conferences are arguably better belonging to rank 1.5or 2.5. At this time, I'm not going to differentiate these. Let me knowif you have some strong comments.
Currently, I mainly focus on academic conferences amd scientificpublications. Thus, do not be surprised if you find other great conferenceslike Defcon/BlackHat are not included here.
Long time ago, I maintained a general computer science conference
ranking (a mirror of my previous Georgia Tech page).

Rank1[align=left]S&P(Oakland)[/align]
IEEE Symposium on Security and Privacy
CCSACM Conference on Computer and Communications Security
Crypto
InternationalCryptology Conference
EurocryptEuropean CryptologyConference
[align=left]Security[/align]
Usenix Security Symposium
NDSSISOC Network andDistributed System Security Symposium
Rank2
 

ESORICS European Symposium on Research in Computer Security
RAIDInternationalSymposium on Recent Advances in Intrusion Detection
ACSACAnnual Computer Security ApplicationsConference
DSNTheInternational Conference on Dependable Systems and Networks
CSF(CSFW)IEEE ComputerSecurity Foundations Symposium.

Supersedes CSFW(Computer Security Foundations Workshop)
TCCTheory ofCryptography Conference
AsiacryptInternationalConference on the Theory and Application of Cryptology and InformationSecurity
IMCInternetMeasurement Conference
Rank3SecureComm IEEECommunications Society/CreateNet Internation Conference on Security andPrivacy for Emerging Areas in Communication Networks
DIMVAGI SIG SIDARConference on Detection of Intrusions and Malware and VulnerabilityAssessment
AsiaCCSACM Symposium onInformation, Computer and Communications Security
ACNSInternationalConference on Applied Cryptography and Network Security
FCInternationalConference on Financial Cryptography and Data Security
SACACM Symposium onApplied Computing
ACISPAustralasia Conference on Information Security and Privacy
ICICSInternationalConference on Information and Communications Security
ISCInformationSecurity Conference
ICISCInternationalConference on Information Security and Cryptology
SACMATACM Symposium onAccess Control Models and Technologies
CT-RSARSA Conference,Cryptographers' Track
SECIFIPInternational Information Security Conference
WiSec

(WiSe, SASN)
ACM Conferenceon Wireless Network Security

Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACMWorkshop on Security of Ad-Hoc and Sensor Networks)
SOUPSSymposium On Usable Privacy and Security
IFIP WG 11.9IFIP WG 11.9 International Conference on DigitalForensics
DFRWSDigital Forensic Research Conference
PETSPrivacy Enhancing Technologies Symposium
--Workshops below --
FSEFast SoftwareEncryption workshop
PKCInternationalWorkshop on Public-Key Cryptography
NSPWNew SecurityParadigms Workshop
IHWorkshop on Information Hiding
WSPECWorkshop on Security and Privacy in E-commerce
DRMACM Workshop onDigital Rights Management
IWIAIEEEInternational Information Assurance Workshop
IAWIEEE SMCInformation Assurance Workshop "The West Point Workshop"
CHESWorkshop onCryptographic Hardware and Embedded Systems
SRUTIUSENIX Workshopon Steps to Reducing Unwanted Traffic on the Internet
HotSecUSENIX Workshopon Hot Topics in Security
LEET

(HotBots,WORM)
USENIX Workshopon Large-scale Exploits and Emergent Threats

Supersedes HotBots (USENIX Workshop on Hot Topics in UnderstandingBotnets) and WORM (ACM Workshop on Recurring/Rapid Malcode)
Others(not ranked)ISPECInformationSecurity Practice and Experience Conference
ICITSInternational Conference on Information Theoretic Security
原文链接:http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: