Security Conferences and Journals in Focus
  Security and Privacy Conferences        
  Conference Submission Notification Venue Location
rank 1 Network and Distributed System Security (NDSS) 6-Oct-13 22-Oct-13 Feb 23-26, 2014 San Diego, USA
rank 3 Financial Cryptography and Data Security (FC) 25-Oct-13 22-Dec-13 March 3-7, 2014 Barbados
  ACM Symposium on Information, Computer and Communications Sec (ASIACCS) 6-Dec-13 27-Jan-14 Jun 4-6, 2014 Kyoto, Japan
  Information Security Practice and Experience Conference (ISPEC) 2-Dec-13 3-Feb-14 May 12-14, 2014 Fuzhou, China
  IEEE Symposium on Hardware-oriented Security and Trust (HOST) - - - -
  International Conference on Critical Infrastructure Protection - - March 17-19, 2014 Virginia, USA
  Constructive Side-channel analysis and Secure Design (COSADE) 14-Dec-13 10-Feb-14 April 14-15, 2014 Paris
  International Conference on Security Protocols (SPW) - - - -
  ACM Symposium on Access Control Models and Technologies (SACMAT) 7-Feb-14 4-Apr-14 June 25-27, 2014 London, Ontario
  International Conference on Trust & Trustworthy Computing (TRUST) 7-Mar-14 7-Apr-14 June 30 - July 2, 14 Crete, Greece
  International Information Security Conference (SEC) 20-Jan-14 10-Mar-14 June 2-4, 2014 Marrakech, Morocco
rank 1 IEEE Symposium on Security and Privacy (SP) 13-Nov-13 3-Feb-13 May 18-21, 2014 San Jose, USA
  Information Security Theory and Practice (WISTP) 7-Mar-14 7-Apr-14 June 23-25, 2014 Crete, Greece
rank 2 Dependable Systems and Networks (DSN) 1-Dec-13 25-Feb-14 June 23 - 26, 2014 Atlanta, USA
  International Conference on Trust Management (IFIP-TM) 19-Feb-14 19-Mar-14 July 7-10, 2014 Singapore
  Information Hiding and Multimedia Security (IHMMSEC) 17-Jan-14 31-Mar-14 June 11-13, 2014 Salzburg, Austria
rank 3 Applied Cryptography and Network Security (ACNS)  10-Jan-14 14-Mar-14 June 10-14, 2014 Switzerland
  International Conference on Security and Cryptography (SECRYPT) 15-Apr-14 16-Jun-14 Aug 28-30, 2014 Vienna, Austria
rank 1 Usenix Security 27-Feb-14 9-May-14 Aug 20-22, 2014 San Diego, USA
  Privacy Enhancing Technologies Symposium (PETS)  10-Feb-14 13-Apr-14 July 16-18, 2014 Amsterdam
  Symposium on Usable Privacy and Security (SOUPS) 28-Feb-14 5-May-14 July 9-11, 2014 CA, USA
not-ranked Conference on Computer Safety, Reliability and Security (SAFECOMP) 28-Feb-14 20-May-14 Sep 10-12, 2014 Firenze, Italy
  8th International Conference on Privacy, Security and Trust (PST) 24-Mar-14 12-May-14 July 23-24, 2014 Toronto
  International workshop on Peer-To-Peer Systems - Usenix (IPTPS) --- --- --- ---
  IEEE Conference on Communications and Network Security (CNS) 1-Mar-14 15-Jun-14 Oct 29-31, 2014 San Francisco, USA
  Mathematical Foundations of Programming Semantics (MFPS) - - - -
rank 2 IEEE Computer Security Foundation Symposium (CSF) 4-Feb-14 11-Apr-14 July 20-22,2014 Vienna, Austria
rank 3 Usenix LEET --- --- -- ---
  Workshop on Foundations of Security and Privacy (FCS-PrivMod)  --- --- --- ---
rank 2 Symposium on Research in Computer Security (ESORICS) 31-Mar-14 10-Jun-14 Sep 7-11, 2014 Worclaw, Poland
  International Conference on Network and System Security (NSS) 8-Apr-14 10-Jun-14 Oct 15-17, 2014 China
  IEEE International Conference on Network Protocols (ICNP) --- --- ---- ---
rank 1 ACM Conference on Computer and Communications Security (CCS) 16-May-14 22-Jul-14 Nov 3-7, 2014 Arizona, USA
  Conference on Security and Privacy in Communication Networks (SECURECOMM) 21-Apr-14 30-Jun-14 Sep 24-26, 2014 Beijing, China
  Internl Conference on Security of Information and Networks (SIN)        
  International Workshop on Security Measurements and Metrics        
rank 2 Annual Computer Security Applications Conference (ACSAC) --- --- --- ---
  ACM Workshop on Privacy in Electronic Society (WPES) --- --- --- --
  European Workshop on System Security (EuroSec) 18-Feb-14 5-Mar-14 April 13, 204 Amsterdam
  Symposium on Recent Advances in Intrusion Detection (RAID) 1-Apr-14 1-Jun-14 Sep 24-24,2014 Gothenburg, Germany
  Virus Bulletin Conference (VB2013) 7-Mar-14   Sep 24-26, 2014 Seattle, USA
  The Second Workshop on Information Hiding Techniques for Internet Anonymity and Privacy - - - -
           
           
           
  Hacking Conferences        
  Black Hat     Aug 2-7, 2014 Las Vegas, USA
  Black Hat Asia --- --- March 25-28, 2014 Singapore
  Black Hat Europe     Oct 14-17, 2014  
  Defcon      Aug 7-10, 2014 Las Vegas, USA
           

 

ISI indexed Security Journals (2012 Data)

Abbreviated Journal Title
(linked to journal information)
ISSN    
Total Cites Impact
Factor
5-Year
Impact
Factor
Immediacy
Index
Articles Cited
Half-life
Eigenfactor
Score
Article Influence
Score
ACM Transactions on Information and System Security   1094-9224 485 0.69 1.341 0.222 9 7.9 0.00146 0.663
Computer Communications 0140-3664 2594 1.079 1.227 0.082 208 5.2 0.0098 0.426
Computer Networks 1389-1286 4109 1.231 1.52 0.307 254 6.4 0.01128 0.544
Computers and Security 0167-4048 927 1.158 1.43 0.183 60 6.8 0.00213 0.464
IEEE Security and Privacy (B) 1540-7993 662 0.962 1.019 0.164 61 5.9 0.00258 0.46
IEEE Transactions on Dependable and Secure Computing  1545-5971 530 1.059 1.576 0.174 69 5.8 0.0021 0.706
IET Information Security  (C) 1751-8709 71 0.623 0.625 0.026 39   0.00054 0.278
International Journal of Critical Infrastructure Protection   1874-5482 41 0.63 0.784 0.067 15   0.00031 0.349
International Journal of Information Security   1615-5262 175 0.48 0.945 0.074 27 5 0.00126 0.562
Internet Research 1066-2243 577 1.5 1.545 0.069 29 7.1 0.00103 0.384
Security and Communication Networks 1939-0114 97 0.311 0.395 0.024 125   0.00085 0.206
IEEE Transactions on Information Forensics and Security   1556-6013 1134 1.895 2.259 0.28 157 3.9 0.00694 0.953

Other Security Journals

  • Journal of Privacy Technology (JOPT), Editor-in-Chief: Latanya Sweeney
    This online-only Journal, started in 2004 and operated by Carnegie Mellon University, is a forum for the publication of original current research in privacy technology. It encourages the submission of any material dealing primarily with the technological aspects of privacy or with the privacy aspects of technology, which may include analysis of the interaction between policy and technology or the technological implications of legal decisions. More information can be found at http://www.jopt.org/.
  • The Kluwer International Series on ADVANCES IN INFORMATION SECURITY.
    The purpose of the Advances in Information Security book series is to establish the state of the art and set the course for future research in information security. The scope of this series includes not only all aspects of computer and network security, but related areas such as fault tolerance and software assurance. The series will serve as a central source of reference for information security research and developments. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. Prospective Authors or Editors: If you have an idea for a book that would fit in this series, we would welcome the opportunity to review your proposal. Should you wish to discuss any potential project further or receive specific information regarding book proposal requirements, please contact either Sushil Jajodia (jajodia@gmu.edu,703-993-1653) or Lance Wobus (lance.wobus@wkap.com, 781-681-0602)
  • International Journal of Network Security, Editors-in-Chief: Min-Shiang Hwang
    International Journal of Network Security is an international official journal of Science Publications, publishing original articles, reviews and short communications of a high scientific and technology in network security. Subjects covered include: access control, computer security, cryptography, communications security, data security, database security, electronic commerce security, information security, multimedia security, and network security. Authors are strongly encouraged to submit their papers electronically by using online manuscript submission at http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang, at the Department of Management Information Systems, National Chung Hsing University, Taiwan, R.O.C. More information can be found at http://ijns.nchu.edu.tw/.
  • International Journal of Security and Networks, Editors-in-Chief: Yang Xiao
    International Journal of Security and Networks is an archival research journal for significant advances in network security. Subject areas include attack models, security mechanisms, security services, authentication, authorization, access control, multicast security, data confidentiality, data integrity, non-repudiation, forensics, privacy protection, secure protocols, formal analyses, intrusion detection, key management, trust establishment, revocation of malicious parties, security policies, fraudulent usage, dependability and reliability, prevention of traffic analysis, network security performance evaluation, tradeoff analysis between performance and security, security standards, etc. All papers must be submitted online at http://www.inderscience.com/ijsn/. More information is given on the journal web page at http://www.inderscience.com/ijsn/.
  • Information Security Technical Report : (B)
  • Digital Forensics, Security and Law Journal : (C)
  • Information Management and Computer Security : (C)
  • Information Security Journal: A global Perspective (C)
  • International Journal of Electronic Security and Digital Forensics (C)
  • International Journal of Computer Science and Network Security (C)
  • International Journal of Information and Computer Security (C)
  • International Journal of Information Security and Privacy (C)
  • International Journal of Security and Networks (C)
  • Journal of Information Privacy and Security C
  • Journal of Information System Security


Other Research and Ranking Links:

 


 

Compiled by Dr. Sami Zhioua (October 2013)