Computer Security Conference Ranking and Statistic 计算机安全会议排名和统计

 

Computer Security Conference Ranking and Statistic

Guofei Gu


Ranking

Note:

  • How to judge how good a conference is? In my opinion, here are several criteria:
  • Acceptance ratio: definitely an important metric (maybe the easiest metric that can be quantified), but not the only metric
  • Paper quality and impact: how many classic papers are from this conference? how much impact do papers from this conference have on the community? are they well cited and studied?
  • Committee member quality: what's the quality of TPC members? are they noted researchers in this area? This is an important factor because they will affect the quality of submission (good papers will prefer to submit to the conference with noted researchers in the committee), and control the quality of accepted papers.
  • Attendee/Paper number ratio: another quantified metric. This somehow reflects the influence of this conference on the community
  • Location: a beautiful place has some attraction. In addition, many researchers (but not all) are not very willing to travel to other countries due to limited funding or time (or VISA problem...), so they just submit papers to local conferences. Thus, normally the conferences located in USA are better than in Europe, which is also better than in Asia.
  • History: a conference with a long history may have a good tradition and reputation
  • Industry connection: this somehow reflects the impact on the industry. Normally, conferences on more applied techniques will attract more industry partners (so have more money to improve the quality of conference)
  • Combining the first few criteria mentioned above, Dr. Jianying Zhou proposed a more quantitative metric (Conference Impact Factor, CIF). Please check out his page here.
  • This ranking list is only in my opinion. It is not official, nor accurate, only for reference. Some good workshops are also included.
  • I'm probably biased because I'm mainly a network/system security researcher. Notify me if you have different views, or you find significant conferences missing/bias. I'm more than happy to hear from you.
  • Some conferences are arguably better belonging to rank 1.5 or 2.5. At this time, I'm not going to differentiate these. Let me know if you have some strong comments.
  • Long time ago, I maintained a general computer science conference ranking (a mirror of my previous Georgia Tech page).
Rank 1
S&P (Oakland)
IEEE Symposium on Security and Privacy
CCSACM Conference on Computer and Communications Security
Crypto International Cryptology Conference
EurocryptEuropean Cryptology Conference
Usenix Security Symposium
NDSSISOC Network and Distributed System Security Symposium
Rank 2

 

ESORICS European Symposium on Research in Computer Security
RAIDInternational Symposium on Recent Advances in Intrusion Detection
ACSACAnnual Computer Security Applications Conference
DSNThe International Conference on Dependable Systems and Networks
CSF (CSFW)IEEE Computer Security Foundations Symposium.
Supersedes CSFW (Computer Security Foundations Workshop)
TCCTheory of Cryptography Conference
AsiacryptInternational Conference on the Theory and Application of Cryptology and Information Security
IMCInternet Measurement Conference
Rank 3SecureComm IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks
DIMVAGI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment
AsiaCCSACM Symposium on Information, Computer and Communications Security
ACNSInternational Conference on Applied Cryptography and Network Security
FCInternational Conference on Financial Cryptography and Data Security
SACACM Symposium on Applied Computing
ACISPAustralasia Conference on Information Security and Privacy
ICICSInternational Conference on Information and Communications Security
ISCInformation Security Conference
ICISCInternational Conference on Information Security and Cryptology
SACMATACM Symposium on Access Control Models and Technologies
CT-RSARSA Conference, Cryptographers' Track
SECIFIP International Information Security Conference
WiSec 
(WiSe, SASN)
ACM Conference on Wireless Network Security
Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks)
SOUPSSymposium On Usable Privacy and Security
IFIP WG 11.9IFIP WG 11.9 International Conference on Digital Forensics
-- Workshops below --
DFRWSDigital Forensic Research Workshop
FSEFast Software Encryption workshop
PKCInternational Workshop on Public-Key Cryptography
NSPWNew Security Paradigms Workshop
IHWorkshop on Information Hiding
WSPECWorkshop on Security and Privacy in E-commerce
DRMACM Workshop on Digital Rights Management
IWIAIEEE International Information Assurance Workshop
IAWIEEE SMC Information Assurance Workshop "The West Point Workshop"
CHESWorkshop on Cryptographic Hardware and Embedded Systems
SRUTIUSENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet
HotSecUSENIX Workshop on Hot Topics in Security
LEET 
(HotBots,WORM)
USENIX Workshop on Large-scale Exploits and Emergent Threats
Supersedes HotBots (USENIX Workshop on Hot Topics in Understanding Botnets) and WORM (ACM Workshop on Recurring/Rapid Malcode)
Others (not ranked) ISPECInformation Security Practice and Experience Conference

 


Acceptance Ratio Statistic

Note:

  • This could be the most complete (and accurate?) list of computer security conference statistics you can find on Internet. There are still some blanks in this list. If you have any reliable source of these information (or some other security conferences), please email me (guofei AT cs.tamu.edu). Thanks.
  • You can see from the following statistic, security conferences are becoming harder and harder to get in in the recent five years! And I think this trend will possible continue in the near future.

 

 YearRank 1Rank 2Rank 3Year
IEEE S&PACM CCSUSENIX SecurityNDSSCSF/CSFWESORICSRAIDACSACIMCSecureCommDIMVAAsiaCCSACNSSOUPSDFRWS
201111%(34/306) 17%(35/204)20%(28/139)        16%(35/217,regular)
27.6%(60/217)
   2011
201011.6% (31/267)17.2%(55/320)14.9%(30/202)15.4%(24/156) 20.8%(42/201)23%(24/104) 17%(39/227)22%(47/211, both short and full)25%(28/112)34%(12/35) 15% (25/166) 18%(32/178)25%(16/64) 2010
200910% (26/253)18.4%(58/315)14.7%(26/176)11.7% (20/171)23.6%(22/93) 19.1%(42/220)28.8%(17/59)19.6%(44/224)22.4%(41/183, both short and full)25.3%(19/75,full paper)
34.7%(26/75)   
29.5%(13/44)22.4% (33/147, regular)
27% (40/147)
21% (32/150)    2009
200811.2% (28/249)18%(51/281) 15.9% (27/170)17.8% (21/118) 18%(21/115)22%(37/168) 25%(20/80)24%(42/173)17.3%(32/185,both short and full) 21%(26/124) 33%(14/42)17.6% (32/182,regular)
22.5% (41/182)
22.9%(30/131)28%(12/43)39.5%(17/43)2008
20078% (20/246,full paper)
12% (29/246)
18% (55/303)12.3% (23/187)14.4% (18/125) 25%(25/101)23.8%(39/164)18% (18/100)22%(42/191)24.4%(21/86, full paper)26%(31/119)24.6%(14/57)18.3% (33/180,regular)
29.4% (53/180, including short paper)
12% (31/260)31.7%(13/41)47.2%(17/36)2007
20069.2% (23/251, full paper)
12.7% (32/251)
14.8%(38/256)
12.3% (22/179)
13.4% (17/127) 24.5%(25/102)20%(32/160)17% (16/93)30%(40/134)21% (19/92, full paper track)25.4%(32/126)26.8%(11/41)17.7% (33/186) Start from 200615.1% (33/218)36%(14/39)44.4%(16/36)2006
20058.9% (17/192)15.2% (38/250)14.8% (22/149)

 

12.9% (16/124)20.8% (20/96)17.0% (27/159)20.5% (17/83)22.8% (45/197)27% (22/82, full paper)22.2% (32/144, full paper)
36.1% (52/144)
Start from 2005

 

27%(14/51) 22.2% (35/158)10/39 2005
200410.2% (19/186)13.9% (35/251)12.0% (22/184)16.3% (16/98)? (20/?)17.0% (27/159)13.5% (16/118)26.1% (35/134)19% (19/98,full paper) 34%(14/41)
Start from 2004
 12.1% (36/297)  2004
200314.5% (19/131)13.8% (35/253)
16.4% (21/128)
20.5% (17/83)? (17/?)16.7% (19/114)29.5% (13/44) 26% (19/73, full paper)   16.8% (32/191)
Start from 2003
  2003
200222.1% (21/95)17.6% (27/153)16.9% (22/130)19.0% (15/79)27.4% (23/84)

 

19.3% (16/83)25.0% (16/64) 24% (15/62, full paper)      2002
200117.8% (19/107)17.6% (27/153)28.9% (24/83)24.2% (16/66)38.9% (21/54)not held21.8% (12/55) 26% (14/53), Start from 2001      2001
200013.1% (18/137)21.2% (28/132) 29.4% (15/51)45.8% (22/48)25.3% (19/75)53.8% (14/26)        2000
199924.6% (15/61)19.3% (16/83)  40.4% (19/47)not held? (32/?)        1999
199816.4% (19/116)20.0% (17/85) 33.3% (15/45) 40.4% (23/57)67.3% (35/52)
Start from 1998
        1998
199718.2% (20/110)26.6% (17/64)not held  not held         1997
199629.9% (20/67)32.2% (19/59)   36.2% (21/58)         1996
199527.8% (20/72)not held   not held         1995
199429.2% (19/65)44.3% (31/70)not heldStart from 1994? 36.6% (26/71)         1994
199324.3% (17/70)45.0% (27/60)
Start from 1993
   not held         1993
199223.6% (21/89)    ? (24/?)         1992
199130.4% (28/92)    not held         1991
1990  Start from 1990?  ? (?/?)
Start from 1990
         1990
1989               1989
1988    Start from 1988          1988
1987               1987
198627.5% (25/91)              1986
198539.7% (25/63)      Start from 1985       1985
198464.1% (25/39)              1984
198367.6% (23/34)              1983
198255.9% (19/34)              1982
1981               1981
1980100% (19/19)
Start from 1980
              1980

 

Thanks the following people for information and suggestions/comments on the ranking and statistic: Kevin Almeroth, Marco Balduzzi, Jihyuk Choi, Nicolas Christin, Mihai Christodorescu, Ton van Deursen, David Evans, Simson Garfinkel, Payas Gupta, Ragib Hasan, Thorsten Holz, Paul A. Karger, Jonathan Katz, Zhiqiang Lin, Abedelaziz Mohaisen, Lukasz Olejnik, Monirul Sharif, Robin Sommer, Vinod Yegneswaran, Jianying Zhou, Thomas Zimmermann, ... and you.

 

http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm

 

信息安全顶级会议: Rank 1 S&P (Oakland) IEEE Symposium on Security and Privacy CCS ACM Conference on Computer and Communications Security Crypto International Cryptology Conference Eurocrypt European Cryptology Conference Security Usenix Security Symposium NDSS ISOC Network and Distributed System Security Symposium ----------------------------------------------------------------- Rank 2 ESORICS European Symposium on Research in Computer Security RAID International Symposium on Recent Advances in Intrusion Detection ACSAC Annual Computer Security Applications Conference DSN The International Conference on Dependable Systems and Networks CSF (CSFW) IEEE Computer Security Foundations Symposium. Supersedes CSFW (Computer Security Foundations Workshop) TCC Theory of Cryptography Conference Asiacrypt International Conference on the Theory and Application of Cryptology and Information Security IMC Internet Measurement Conference -------------------------------------------------------------- Rank 3 SecureComm IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks DIMVA GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment AsiaCCS ACM Symposium on Information, Computer and Communications Security ACNS International Conference on Applied Cryptography and Network Security FC International Conference on Financial Cryptography and Data Security SAC ACM Symposium on Applied Computing ACISP Australasia Conference on Information Security and Privacy ICICS International Conference on Information and Communications Security ISC Information Security Conference ICISC International Conference on Information Security and Cryptology SACMAT ACM Symposium on Access Control Models and Technologies CT-RSA RSA Conference, Cryptographers' Track SEC IFIP International Information Security Conference WiSec (WiSe, SASN) ACM Conference on Wireless Network Security Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks) -- Workshops below --
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值