background preloader

CFP's

Facebook Twitter

Core.edu.au/cms/images/downloads/conference/08sort acronymERA2010_conference_list.pdf. Security Conference Ranking. Conference Rank. The 2013 ACM SIGMOD/PODS Conference: New York, New York, USA - Calls for Submissions. Welcome Organization Links Calls For Submissions PODS Program SIGMOD Program.

The 2013 ACM SIGMOD/PODS Conference: New York, New York, USA - Calls for Submissions

NDSS 2013 : 20th Network & Distributed System Security Symposium. The 20th Annual Network and Distributed System Security (NDSS) Symposium The Catamaran Resort Hotel and Spa San Diego, California 24-27 February 2013 Important Dates Titles and abstracts of papers due: Wednesday, 1 August 2012 (11:59 pm EDT) Full paper and panel submissions due: Monday, 6 August 2012 (11:59 pm EDT) Author notification: Monday, 22 October 2012 Final version of papers and panels due: Monday, 3 December 2012 Symposium Goals The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security.

NDSS 2013 : 20th Network & Distributed System Security Symposium

The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technologies. The proceedings are published by the Internet Society. MMM-ACNS-12 Conference.

Acceptance rates at security conferences. How competitive are security research conferences?

Acceptance rates at security conferences

Several people have been tracking this information. Mihai Christodorescu has a nice chart of acceptance and submission rates over time. The most recent data point we have is the 2009 Usenix Security Symposium, which accepted 26 of 176 submissions (a 14.8% acceptance ratio, consistent with recent years). Acceptance rates like that, at top security conferences, are now pretty much the norm. With its deadline one week ago, ACM CCS 2009 got 317 submissions this year (up from 274 last year, and approx. 300 the year before) and ESORICS 2009, with a submission deadline last Friday night, got 222 submissions (up from about 170 last year). Think about that: right now there are over 500 research manuscripts in the field of computer security fighting it out, and maybe 15-20% of those will get accepted.

What are we supposed to do with the papers that are rejected, resubmitted, rejected again, and so on? AISEC 2012. [PDF flyer] The applications of artificial intelligence, machine learning, and data mining for security and privacy problems continues to grow.

AISEC 2012

One recent trend is the growth of Big Data Analytics and the establishment of Security Information and Event Management systems built to obtain security intelligence and situational awareness. With the advent of cloud-computing, every advantage the cloud offers, such as large-scale machine learning and data-driven abuse detection, is being leveraged to improve security. We invite original research papers describing the use of AI or machine learning in security and privacy problems. We also invite position and open problem papers discussing the role of AI or machine learning in security and privacy. Submissions can be made through EasyChair using the following link:

Mihai Christodorescu - Acceptance Rates for Selected Computer-Security Conferences. Note: I am looking to fill the gaps in the tables below.

Mihai Christodorescu - Acceptance Rates for Selected Computer-Security Conferences

I am also looking for acceptance-rate information for ACSAC. If you have printed proceedings (or other reliable source) listing the number of submissions and the number of accepted papers, please contact me at mihai@cs.wisc.edu. The data was extracted from conference proceedings, unless otherwise noted. If you cannot see any data, make sure that Javascript is enabled and working in your web browser. Security Conference Ranking and Statistic. Computer Security Conference Ranking and Statistic Guofei Gu Ranking Note: How to judge how good a conference is?

Security Conference Ranking and Statistic

In my opinion, here are several criteria: 2012 - Call for Papers. Securecomm seeks high-quality research contributions in the form of well-developed papers.

2012 - Call for Papers

Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated. Technical papers describing original unpublished research are solicited. Submissions must not be concurrently under review by a conference, journal or any other venue that has proceedings. Topics Topics of interest include, but are not limited to, the following: Publications Conference proceedings Accepted papers will be published in Springer's LNICST series and will appear in the SpringerLink, one of the largest digital libraries online that covers a variety of scientific disciplines, as well as in the ICST's own EU Digital Library (EUDL).

Recent Advances in Intrusion Detection (RAID) Symposium. Security '13. DIMVA 2013 Call For Papers. Esorics2012 - Call for Papers. Security '12 Call for Papers.