Computer Security Conference Ranking
Ranking
Note:
- How to judge how good a conference is? In my opinion, hereare several criteria:
- Acceptance ratio:definitely an important metric (maybe the easiest metric that can bequantified), but not the only metric
- Paper quality and impact:how many classic papers are from this conference? how much impact dopapers from this conference have on the community? are they well citedand studied?
- Committee member quality:what's the quality of TPC members? are they noted researchers in thisarea? This is an important factor because they will affect the qualityof submission (good papers will prefer to submit to the conference withnoted researchers in the committee), and control the quality ofaccepted papers.
- Attendee/Paper number ratio:another quantified metric. This somehow reflects the influence of thisconference on the community
- Location: abeautiful place has some attraction. In addition, many researchers (butnot all) are not very willing to travel to other countries due tolimited funding or time (or VISA problem...), so they just submitpapers to local conferences. Thus, normally the conferences located inUSA are better than in Europe, which is also better than in Asia.
- History:a conference with a long history may have a good tradition andreputation
- Industry connection:this somehow reflects the impact on the industry. Normally, conferenceson more applied techniques will attract more industry partners (so havemore money to improve the quality of conference)
- Combining the first few criteria mentioned above, Dr. Jianying Zhouproposed a more quantitative metric (Conference Impact Factor, CIF).Please check out his pagehere.
- This ranking list is only in my opinion. It is notofficial, nor accurate, only for reference. Some good workshops arealso included.
- I'm probably biased because I'm mainly a network/systemsecurity researcher. Notify me if you have different views, or you findsignificant conferences missing/bias. I'm more than happy to hear from you.
- Some conferences are arguably better belonging to rank 1.5or 2.5. At this time, I'm not going to differentiate these. Let me knowif you have some strong comments.
- Currently, I mainly focus on academic conferences amd scientificpublications. Thus, do not be surprised if you find other great conferenceslike Defcon/BlackHat are not included here.
- Long time ago, I maintained a general computer science conference ranking (a mirror of my previous Georgia Tech page).
| Rank1 |
S&P(Oakland)
| IEEE Symposium on Security and Privacy |
| CCS | ACM Conference on Computer and Communications Security | |
| Crypto | InternationalCryptology Conference | |
| Eurocrypt | European CryptologyConference | |
| Usenix Security Symposium | ||
| NDSS | ISOC Network andDistributed System Security Symposium | |
| Rank2
| ESORICS | European Symposium on Research in Computer Security |
| RAID | InternationalSymposium on Recent Advances in Intrusion Detection | |
| ACSAC | Annual Computer Security ApplicationsConference | |
| DSN | TheInternational Conference on Dependable Systems and Networks | |
| CSF(CSFW) | IEEE ComputerSecurity Foundations Symposium. Supersedes CSFW(Computer Security Foundations Workshop) | |
| TCC | Theory ofCryptography Conference | |
| Asiacrypt | InternationalConference on the Theory and Application of Cryptology and InformationSecurity | |
| IMC | InternetMeasurement Conference | |
| Rank3 | SecureComm | IEEECommunications Society/CreateNet Internation Conference on Security andPrivacy for Emerging Areas in Communication Networks |
| DIMVA | GI SIG SIDARConference on Detection of Intrusions and Malware and VulnerabilityAssessment | |
| AsiaCCS | ACM Symposium onInformation, Computer and Communications Security | |
| ACNS | InternationalConference on Applied Cryptography and Network Security | |
| FC | InternationalConference on Financial Cryptography and Data Security | |
| SAC | ACM Symposium onApplied Computing | |
| ACISP | Australasia Conference on Information Security and Privacy | |
| ICICS | InternationalConference on Information and Communications Security | |
| ISC | InformationSecurity Conference | |
| ICISC | InternationalConference on Information Security and Cryptology | |
| SACMAT | ACM Symposium onAccess Control Models and Technologies | |
| CT-RSA | RSA Conference,Cryptographers' Track | |
| SEC | IFIPInternational Information Security Conference | |
| WiSec (WiSe, SASN) | ACM Conferenceon Wireless Network Security Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACMWorkshop on Security of Ad-Hoc and Sensor Networks) | |
| SOUPS | Symposium On Usable Privacy and Security | |
| IFIP WG 11.9 | IFIP WG 11.9 International Conference on DigitalForensics | |
| DFRWS | Digital Forensic Research Conference | |
| PETS | Privacy Enhancing Technologies Symposium | |
| --Workshops below -- | ||
| FSE | Fast SoftwareEncryption workshop | |
| PKC | InternationalWorkshop on Public-Key Cryptography | |
| NSPW | New SecurityParadigms Workshop | |
| IH | Workshop on Information Hiding | |
| WSPEC | Workshop on Security and Privacy in E-commerce | |
| DRM | ACM Workshop onDigital Rights Management | |
| IWIA | IEEEInternational Information Assurance Workshop | |
| IAW | IEEE SMCInformation Assurance Workshop "The West Point Workshop" | |
| CHES | Workshop onCryptographic Hardware and Embedded Systems | |
| SRUTI | USENIX Workshopon Steps to Reducing Unwanted Traffic on the Internet | |
| HotSec | USENIX Workshopon Hot Topics in Security | |
| LEET (HotBots,WORM) | USENIX Workshopon Large-scale Exploits and Emergent Threats Supersedes HotBots (USENIX Workshop on Hot Topics in UnderstandingBotnets) and WORM (ACM Workshop on Recurring/Rapid Malcode) | |
| Others(not ranked) | ISPEC | InformationSecurity Practice and Experience Conference |
| ICITS | International Conference on Information Theoretic Security | |
原文链接:http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
1305

被折叠的 条评论
为什么被折叠?



