Security Conferences and Journals in Focus
|
Security and Privacy Conferences |
|
|
|
|
|
Conference |
Submission |
Notification |
Venue |
Location |
rank 1 |
Network and Distributed System Security (NDSS) |
6-Oct-13 |
22-Oct-13 |
Feb 23-26, 2014 |
San Diego, USA |
rank 3 |
Financial Cryptography and Data Security (FC) |
25-Oct-13 |
22-Dec-13 |
March 3-7, 2014 |
Barbados |
|
ACM Symposium on Information, Computer and Communications Sec
(ASIACCS) |
6-Dec-13 |
27-Jan-14 |
Jun 4-6, 2014 |
Kyoto, Japan |
|
Information Security Practice and Experience Conference (ISPEC) |
2-Dec-13 |
3-Feb-14 |
May 12-14, 2014 |
Fuzhou, China |
|
IEEE Symposium on Hardware-oriented Security and Trust (HOST) |
- |
- |
- |
- |
|
International Conference on Critical Infrastructure Protection |
- |
- |
March 17-19, 2014 |
Virginia, USA |
|
Constructive Side-channel analysis and Secure Design (COSADE) |
14-Dec-13 |
10-Feb-14 |
April 14-15, 2014 |
Paris |
|
International Conference on Security Protocols (SPW) |
- |
- |
- |
- |
|
ACM Symposium on Access Control Models and Technologies (SACMAT) |
7-Feb-14 |
4-Apr-14 |
June 25-27, 2014 |
London, Ontario |
|
International Conference on Trust & Trustworthy Computing (TRUST) |
7-Mar-14 |
7-Apr-14 |
June 30 - July 2, 14 |
Crete, Greece |
|
International Information Security Conference (SEC) |
20-Jan-14 |
10-Mar-14 |
June 2-4, 2014 |
Marrakech, Morocco |
rank 1 |
IEEE Symposium on Security and Privacy (SP) |
13-Nov-13 |
3-Feb-13 |
May 18-21, 2014 |
San Jose, USA |
|
Information Security Theory and Practice (WISTP) |
7-Mar-14 |
7-Apr-14 |
June 23-25, 2014 |
Crete, Greece |
rank 2 |
Dependable Systems and Networks (DSN) |
1-Dec-13 |
25-Feb-14 |
June 23 - 26, 2014 |
Atlanta, USA |
|
International Conference on Trust Management (IFIP-TM) |
19-Feb-14 |
19-Mar-14 |
July 7-10, 2014 |
Singapore |
|
Information Hiding and Multimedia Security (IHMMSEC) |
17-Jan-14 |
31-Mar-14 |
June 11-13, 2014 |
Salzburg, Austria |
rank 3 |
Applied Cryptography and Network Security (ACNS) |
10-Jan-14 |
14-Mar-14 |
June 10-14, 2014 |
Switzerland |
|
International Conference on Security and Cryptography (SECRYPT) |
15-Apr-14 |
16-Jun-14 |
Aug 28-30, 2014 |
Vienna, Austria |
rank 1 |
Usenix Security |
27-Feb-14 |
9-May-14 |
Aug 20-22, 2014 |
San Diego, USA |
|
Privacy Enhancing Technologies Symposium (PETS) |
10-Feb-14 |
13-Apr-14 |
July 16-18, 2014 |
Amsterdam |
|
Symposium on
Usable Privacy and Security (SOUPS) |
28-Feb-14 |
5-May-14 |
July 9-11, 2014 |
CA, USA |
not-ranked |
Conference on Computer Safety, Reliability and Security (SAFECOMP) |
28-Feb-14 |
20-May-14 |
Sep 10-12, 2014 |
Firenze, Italy |
|
8th International Conference on Privacy, Security and Trust (PST) |
24-Mar-14 |
12-May-14 |
July 23-24, 2014 |
Toronto |
|
International workshop on Peer-To-Peer Systems - Usenix (IPTPS) |
--- |
--- |
--- |
--- |
|
IEEE Conference on Communications and Network Security (CNS) |
1-Mar-14 |
15-Jun-14 |
Oct 29-31, 2014 |
San Francisco, USA |
|
Mathematical Foundations of Programming Semantics (MFPS) |
- |
- |
- |
- |
rank 2 |
IEEE Computer Security Foundation Symposium (CSF) |
4-Feb-14 |
11-Apr-14 |
July 20-22,2014 |
Vienna, Austria |
rank 3 |
Usenix LEET |
--- |
--- |
-- |
--- |
|
Workshop on Foundations of Security and Privacy (FCS-PrivMod) |
--- |
--- |
--- |
--- |
rank 2 |
Symposium on Research in Computer Security (ESORICS) |
31-Mar-14 |
10-Jun-14 |
Sep 7-11, 2014 |
Worclaw, Poland |
|
International Conference on Network and System Security (NSS) |
8-Apr-14 |
10-Jun-14 |
Oct 15-17, 2014 |
China |
|
IEEE International Conference on Network Protocols (ICNP) |
--- |
--- |
---- |
--- |
rank 1 |
ACM Conference on Computer and Communications Security (CCS) |
16-May-14 |
22-Jul-14 |
Nov 3-7, 2014 |
Arizona, USA |
|
Conference on Security and Privacy in Communication Networks
(SECURECOMM) |
21-Apr-14 |
30-Jun-14 |
Sep 24-26, 2014 |
Beijing, China |
|
Internl Conference on Security of Information and Networks (SIN) |
|
|
|
|
|
International Workshop on Security Measurements and Metrics |
|
|
|
|
rank 2 |
Annual Computer Security Applications Conference (ACSAC) |
--- |
--- |
--- |
--- |
|
ACM Workshop on Privacy in Electronic Society (WPES) |
--- |
--- |
--- |
-- |
|
European Workshop on System Security (EuroSec) |
18-Feb-14 |
5-Mar-14 |
April 13, 204 |
Amsterdam |
|
Symposium on Recent Advances in Intrusion Detection (RAID) |
1-Apr-14 |
1-Jun-14 |
Sep 24-24,2014 |
Gothenburg, Germany |
|
Virus Bulletin Conference (VB2013) |
7-Mar-14 |
|
Sep 24-26, 2014 |
Seattle, USA |
|
The Second Workshop on Information Hiding Techniques for Internet
Anonymity and Privacy |
- |
- |
- |
- |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Hacking Conferences |
|
|
|
|
|
Black Hat |
|
|
Aug 2-7, 2014 |
Las Vegas, USA |
|
Black Hat Asia |
--- |
--- |
March 25-28, 2014 |
Singapore |
|
Black Hat Europe |
|
|
Oct 14-17, 2014 |
|
|
Defcon |
|
|
Aug 7-10, 2014 |
Las Vegas, USA |
|
|
|
|
|
|
ISI indexed Security Journals (2012 Data)
Other Security Journals
- Journal of Privacy Technology (JOPT), Editor-in-Chief: Latanya
Sweeney
This online-only Journal, started in 2004 and operated by Carnegie
Mellon University, is a forum for the publication of original current
research in privacy technology. It encourages the submission of any
material dealing primarily with the technological aspects of privacy or
with the privacy aspects of technology, which may include analysis of
the interaction between policy and technology or the technological
implications of legal decisions. More information can be found at
http://www.jopt.org/.
- The Kluwer International Series on ADVANCES IN INFORMATION SECURITY.
The purpose of the Advances in Information Security book series is to
establish the state of the art and set the course for future research in
information security. The scope of this series includes not only all
aspects of computer and network security, but related areas such as
fault tolerance and software assurance. The series will serve as a
central source of reference for information security research and
developments. The series aims to publish thorough and cohesive overviews
on specific topics in Information Security, as well as works that are
larger in scope than survey articles and that will contain more detailed
background information. The series also provides a single point of
coverage of advanced and timely topics and a forum for topics that may
not have reached a level of maturity to warrant a comprehensive textbook.
Prospective Authors or Editors: If you have an idea for a book that
would fit in this series, we would welcome the opportunity to review
your proposal. Should you wish to discuss any potential project further
or receive specific information regarding book proposal requirements,
please contact either Sushil Jajodia (jajodia@gmu.edu,703-993-1653) or
Lance Wobus (lance.wobus@wkap.com,
781-681-0602)
- International Journal of Network Security, Editors-in-Chief: Min-Shiang
Hwang
International Journal of Network Security is an international official
journal of Science Publications, publishing original articles, reviews
and short communications of a high scientific and technology in network
security. Subjects covered include: access control, computer security,
cryptography, communications security, data security, database security,
electronic commerce security, information security, multimedia security,
and network security. Authors are strongly encouraged to submit their
papers electronically by using online manuscript submission at
http://ijns.nchu.edu.tw/, or submit their Word, ps or pdf file to the
editor-in-chief (via Email: mshwang@isrc.nchu.edu.tw): Min-Shiang Hwang,
at the Department of Management Information Systems, National Chung
Hsing University, Taiwan, R.O.C. More information can be found at
http://ijns.nchu.edu.tw/.
- International Journal of Security and Networks, Editors-in-Chief:
Yang Xiao
International Journal of Security and Networks is an archival research
journal for significant advances in network security. Subject areas
include attack models, security mechanisms, security services,
authentication, authorization, access control, multicast security, data
confidentiality, data integrity, non-repudiation, forensics, privacy
protection, secure protocols, formal analyses, intrusion detection, key
management, trust establishment, revocation of malicious parties,
security policies, fraudulent usage, dependability and reliability,
prevention of traffic analysis, network security performance evaluation,
tradeoff analysis between performance and security, security standards,
etc. All papers must be submitted online at http://www.inderscience.com/ijsn/.
More information is given on the journal web page at
http://www.inderscience.com/ijsn/.
- Information Security Technical Report : (B)
- Digital Forensics, Security and Law Journal : (C)
- Information Management and Computer Security : (C)
- Information Security Journal: A global Perspective (C)
- International Journal of Electronic Security and Digital Forensics
(C)
- International Journal of Computer Science and Network Security (C)
- International Journal of Information and Computer Security (C)
- International Journal of Information Security and Privacy (C)
- International Journal of Security and Networks (C)
- Journal of Information Privacy and Security C
- Journal of Information System Security
Other Research and Ranking Links:
Compiled by Dr. Sami Zhioua (October 2013)
|