网络安全相关会议排名
2012-11-23 09:29
459 查看
Computer Security Conference Ranking
Ranking
Note:How to judge how good a conference is? In my opinion, hereare several criteria:
Acceptance ratio:definitely an important metric (maybe the easiest metric that can bequantified), but not the only metric
Paper quality and impact:how many classic papers are from this conference? how much impact dopapers from this conference have on the community? are they well citedand studied?
Committee member quality:what's the quality of TPC members? are they noted researchers in thisarea? This is an important factor because they will affect the qualityof submission (good papers will prefer to submit to the conference
withnoted researchers in the committee), and control the quality ofaccepted papers.
Attendee/Paper number ratio:another quantified metric. This somehow reflects the influence of thisconference on the community
Location: abeautiful place has some attraction. In addition, many researchers (butnot all) are not very willing to travel to other countries due tolimited funding or time (or VISA problem...), so they just submitpapers to local conferences.
Thus, normally the conferences located inUSA are better than in Europe, which is also better than in Asia.
History:a conference with a long history may have a good tradition andreputation
Industry connection:this somehow reflects the impact on the industry. Normally, conferenceson more applied techniques will attract more industry partners (so havemore money to improve the quality of conference)
Combining the first few criteria mentioned above, Dr. Jianying Zhouproposed a more quantitative metric (Conference Impact Factor, CIF).Please check out his pagehere.
This ranking list is only in my opinion. It is notofficial, nor accurate, only for reference. Some good workshops arealso included.
I'm probably biased because I'm mainly a network/systemsecurity researcher. Notify me if you have different views, or you findsignificant conferences missing/bias. I'm more than happy to hear from you.
Some conferences are arguably better belonging to rank 1.5or 2.5. At this time, I'm not going to differentiate these. Let me knowif you have some strong comments.
Currently, I mainly focus on academic conferences amd scientificpublications. Thus, do not be surprised if you find other great conferenceslike Defcon/BlackHat are not included here.
Long time ago, I maintained a general computer science conference
ranking (a mirror of my previous Georgia Tech page).
Rank1 | [align=left]S&P(Oakland)[/align] | IEEE Symposium on Security and Privacy |
CCS | ACM Conference on Computer and Communications Security | |
Crypto | InternationalCryptology Conference | |
Eurocrypt | European CryptologyConference | |
[align=left]Security[/align] | Usenix Security Symposium | |
NDSS | ISOC Network andDistributed System Security Symposium | |
Rank2 | ESORICS | European Symposium on Research in Computer Security |
RAID | InternationalSymposium on Recent Advances in Intrusion Detection | |
ACSAC | Annual Computer Security ApplicationsConference | |
DSN | TheInternational Conference on Dependable Systems and Networks | |
CSF(CSFW) | IEEE ComputerSecurity Foundations Symposium. Supersedes CSFW(Computer Security Foundations Workshop) | |
TCC | Theory ofCryptography Conference | |
Asiacrypt | InternationalConference on the Theory and Application of Cryptology and InformationSecurity | |
IMC | InternetMeasurement Conference | |
Rank3 | SecureComm | IEEECommunications Society/CreateNet Internation Conference on Security andPrivacy for Emerging Areas in Communication Networks |
DIMVA | GI SIG SIDARConference on Detection of Intrusions and Malware and VulnerabilityAssessment | |
AsiaCCS | ACM Symposium onInformation, Computer and Communications Security | |
ACNS | InternationalConference on Applied Cryptography and Network Security | |
FC | InternationalConference on Financial Cryptography and Data Security | |
SAC | ACM Symposium onApplied Computing | |
ACISP | Australasia Conference on Information Security and Privacy | |
ICICS | InternationalConference on Information and Communications Security | |
ISC | InformationSecurity Conference | |
ICISC | InternationalConference on Information Security and Cryptology | |
SACMAT | ACM Symposium onAccess Control Models and Technologies | |
CT-RSA | RSA Conference,Cryptographers' Track | |
SEC | IFIPInternational Information Security Conference | |
WiSec (WiSe, SASN) | ACM Conferenceon Wireless Network Security Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACMWorkshop on Security of Ad-Hoc and Sensor Networks) | |
SOUPS | Symposium On Usable Privacy and Security | |
IFIP WG 11.9 | IFIP WG 11.9 International Conference on DigitalForensics | |
DFRWS | Digital Forensic Research Conference | |
PETS | Privacy Enhancing Technologies Symposium | |
--Workshops below -- | ||
FSE | Fast SoftwareEncryption workshop | |
PKC | InternationalWorkshop on Public-Key Cryptography | |
NSPW | New SecurityParadigms Workshop | |
IH | Workshop on Information Hiding | |
WSPEC | Workshop on Security and Privacy in E-commerce | |
DRM | ACM Workshop onDigital Rights Management | |
IWIA | IEEEInternational Information Assurance Workshop | |
IAW | IEEE SMCInformation Assurance Workshop "The West Point Workshop" | |
CHES | Workshop onCryptographic Hardware and Embedded Systems | |
SRUTI | USENIX Workshopon Steps to Reducing Unwanted Traffic on the Internet | |
HotSec | USENIX Workshopon Hot Topics in Security | |
LEET (HotBots,WORM) | USENIX Workshopon Large-scale Exploits and Emergent Threats Supersedes HotBots (USENIX Workshop on Hot Topics in UnderstandingBotnets) and WORM (ACM Workshop on Recurring/Rapid Malcode) | |
Others(not ranked) | ISPEC | InformationSecurity Practice and Experience Conference |
ICITS | International Conference on Information Theoretic Security |
相关文章推荐
- yum相关命令 -- 第七章、网络安全与主机基本防护: 限制端口口, 网络升级与 SELinux
- 长沙网络会议第五届中美医院信息化论坛----网络安全与管理
- Xen安全架构sHype/ACM和XSM/Flask的相关网络资源
- 网络安全相关知识与计算机互联网基础知识
- 网络安全相关站点
- 安全知识之网络扫描器概念与相关技术
- 分享几一些网络安全和编程相关的书1(不定期更新........)
- 网络安全相关站点
- 网络与信息安全 - CCF推荐国际学术会议和期刊目录
- 整理网络安全相关,起步网络安全(小黑hacker)必看
- 利用ISCSI搭建IP存储网络iSCSI在安全方面相关设定
- 计算机领域相关期刊会议及排名
- 信息与网络安全相关参考资料的下载
- 网络安全相关站点
- 网络安全相关站点
- 2005中国计算机网络安全应急年会会议报告资料下载
- 2005中国计算机网络安全应急年会会议报告(CNCERT/CC)
- 关于网络安全通过c++实现CA证书相关总结