计算机安全方面的顶级会议
2007-12-11 08:49
330 查看
Computer Security Conference Ranking and Statistic
Guofei GuRanking
Note:How to judge how good a conference is? In my opinion, here are several criterias:
Acceptance ratio: definitely an important metric (maybe the easiest metric that can be quantified), but not the only metric
Paper quality and impact: how many classic papers are from this conference? how much impact do papers from this conference have on the community? are they well cited and studied?
Committee member quality: what's the quality of TPC members? are they noted researchers in this area? This is an important factor because they will affect the quality of submission (good papers will prefer to submit to the conference with noted researchers in the committee), and control the quality of accepted papers.
Attendee/Paper number ratio: another quantified metric. This somehow reflects the influence of this conference on the community
Location: a beautiful place has some attraction. In addition, many researchers (but not all) are not very willing to travel to other countries due to limited funding or time (or VISA problem...), so they just submit papers to local conferences. Thus, normally the conferences located in USA are better than in Europe, which is also better than in Asia.
History: a conference with a long history may have a good tradition and reputation
Industry connection: this somehow reflects the impact on the industry. Normally, conferences on more applied techniques will attract more industry partners (so have more money to improve the quality of conference)
This ranking list is only in my opinion. It is not official, nor accurate, only for reference. Some good workshops are also included.
For a general CS conference ranking list, please visit here.
Rank 1 | [align=left]S&P(Oakland) [/align] | IEEE Symposium on Security and Privacy |
CCS | ACM Conference on Computer and Communications Security | |
Crypto | International Cryptology Conference | |
Eurocrypt | European Cryptology Conference | |
[align=left]Security[/align] | Usenix Security Symposium | |
NDSS | ISOC Network and Distributed System Security Symposium | |
Rank 2 | ESORICS | European Symposium on Research in Computer Security |
RAID | International Symposium on Recent Advances in Intrusion Detection | |
ACSAC | Annual Computer Security Applications Conference | |
DSN | The International Conference on Dependable Systems and Networks | |
CSFW | IEEE Computer Security Foundations Workshop | |
Asiacrypt | International Conference on the Theory and Application of Cryptology and Information Security | |
Rank 3 | ||
TCC | Theory of Cryptography Conference | |
SecureComm | IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks | |
AsiaCCS | ACM Symposium on Information, Computer and Communications Security | |
ACNS | International Conference on Applied Cryptography and Network Security | |
NSPW | New Security Paradigms Workshop | |
PKC | International Workshop on Public-Key Cryptography | |
FC | Financial Cryptography | |
SAC | ACM Symposium on Applied Computing | |
ACISP | Australasia Conference on Information Security and Privacy | |
ICICS | International Conference on Information and Communications Security | |
ISC | Information Security Conference | |
ICISC | International Conference on Information Security and Cryptology | |
FSE | Fast Software Encryption | |
IH | Workshop on Information Hiding | |
WSPEC | Workshop on Security and Privacy in E-commerce | |
WiSe | ACM Workshop on Wireless Security | |
SASN | ACM Workshop on Security of Ad-Hoc and Sensor Networks | |
WORM | ACM Workshop on Rapid Malcode | |
DRM | ACM Workshop on Digital Rights Management | |
SEC | IFIP International Information Security Conference | |
SACMAT | ACM Symposium on Access Control Models and Technologies | |
CHES | Workshop on Cryptographic Hardware and Embedded Systems | |
CT-RSA | RSA Conference, Cryptographers' Track | |
DIMVA | GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment | |
SRUTI | USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet | |
HotSec | USENIX Workshop on Hot Topics in Security | |
others (not ranked) | [align=left]ISPEC[/align] | Information Security Practice and Experience Conference |
Acceptance Ratio Statistic
Note:This could be the most complete (and accurate?) list of computer security conference statistic you can find on Internet. There are still some blanks in this list. If you have any reliable source of these information (or some other security conferences), please email me (guofei AT cc.gatech.edu). Thanks.
You can see from the following statistic, security conferences are becoming harder and harder to get in in the recent five years! And I think this trend will possible continue in the near future.
Year | Rank 1 | Rank 2 | Rank 3 | ||||||||
IEEE S&P | ACM CCS | USENIX Security | NDSS | CSFW | ESORICS | RAID | ACSAC | SecureComm | AsiaCCS | ACNS | |
2007 | 12.3% (23/187) | ||||||||||
2006 | 9.2% (23/251, full paper) 12.7% (32/251) | 14.8%(38/256) | [align=left]12.3% (22/179)[/align] | 13.4% (17/127) | 24.5%(25/102) | 20%(32/160) | 17% (16/93) | 30%(40/134) | 25.4%(32/126) | 17.7% (33/186) Start from 2006 | 15.1% (33/218) |
2005 | 8.9% (17/192) | 15.2% (38/250) | 14.8% (22/149) | 12.9% (16/124) | 20.8% (20/96) | 17.0% (27/159) | 20.5% (17/83) | 22.8% (45/197) | 22.2% (32/144, full paper) 36.1% (52/144) Start from 2005 | 22.2% (35/158) | |
2004 | 10.2% (19/186) | 13.9% (35/251) | 12.0% (22/184) | 16.3% (16/98) | ? (20/?) | 17.0% (27/159) | 13.5% (16/118) | 26.1% (35/134) | 12.1% (36/297) | ||
2003 | 14.5% (19/131) | 13.8% (35/253) | [align=left]16.4% (21/128)[/align] | 20.5% (17/83) | ? (17/?) | 16.7% (19/114) | 29.5% (13/44) | 16.8% (32/191) Start from 2003 | |||
2002 | 22.1% (21/95) | 17.6% (27/153) | 16.9% (22/130) | 19.0% (15/79) | 27.4% (23/84) | 19.3% (16/83) | 25.0% (16/64) | ||||
2001 | 17.8% (19/107) | 17.6% (27/153) | 28.9% (24/83) | 24.2% (16/66) | 38.9% (21/54) | not held | 21.8% (12/55) | ||||
2000 | 13.1% (18/137) | 21.2% (28/132) | 29.4% (15/51) | 45.8% (22/48) | 25.3% (19/75) | 53.8% (14/26) | |||||
1999 | 24.6% (15/61) | 19.3% (16/83) | 40.4% (19/47) | not held | ? (32/?) | ||||||
1998 | 16.4% (19/116) | 20.0% (17/85) | 33.3% (15/45) | 40.4% (23/57) | 67.3% (35/52) Start from 1998 | ||||||
1997 | 18.2% (20/110) | 26.6% (17/64) | not held | not held | |||||||
1996 | 29.9% (20/67) | 32.2% (19/59) | 36.2% (21/58) | ||||||||
1995 | 27.8% (20/72) | not held | not held | ||||||||
1994 | 29.2% (19/65) | 44.3% (31/70) | not held | Start from 1994 | 36.6% (26/71) | ||||||
1993 | 24.3% (17/70) | 45.0% (27/60) Start from 1993 | not held | ||||||||
1992 | 23.6% (21/89) | ? (24/?) | |||||||||
1991 | 30.4% (28/92) | not held | |||||||||
1990 | Start from 1990? | ? (?/?) Start from 1990 | |||||||||
1989 | |||||||||||
1988 | Start from 1988 | ||||||||||
1987 | |||||||||||
1986 | 27.5% (25/91) | ||||||||||
1985 | 39.7% (25/63) | Start from 1985 | |||||||||
1984 | 64.1% (25/39) | ||||||||||
1983 | 67.6% (23/34) | ||||||||||
1982 | 55.9% (19/34) | ||||||||||
1981 | |||||||||||
1980 | Start from 1980 |
转自http://www-static.cc.gatech.edu/~guofei
Trackback: http://tb.blog.csdn.net/TrackBack.aspx?PostId=1619538
相关文章推荐
- 计算机安全方面的顶级会议
- 计算机安全方面的顶级会议 (2010年1月31日更新)
- 计算机安全方面的顶级会议
- 计算机安全方面的顶级会议
- 计算机安全方面的顶级会议
- 计算机方面的顶级会议
- 计算机安全方面的一些会议
- 计算机国际安全顶级会议
- 计算机顶级会议排名
- 计算机方向的一些顶级会议和期刊—Top Conferences and Journals in Computer Science
- 计算机领域的顶级会议和期刊
- 计算机系统领域顶级会议--OSDI,SOSP
- 计算机视觉、人工智能、数据挖掘顶级会议(Computer Version & AI & Data Mining Top Conference)
- 【转载】为什么不去读顶级会议上的论文?适应于机器学习、计算机视觉和人工智能
- 计算机顶级会议Rankings && 英文投稿的一点经验
- ¥¥¥¥ 63大计算机科学顶级会议
- computer vision(计算机视觉)方面的期刊会议,学术必备
- (转)计算机领域的顶级会议和期刊
- 计算机视觉领域的顶级国际会议和期刊列表
- 计算机顶级会议Rankings && 英文投稿的一点经验