Paper Submission Planning
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

 
View only
 
 
Still loading...
ABCDEFGHIJKLMNOPQRSTU
1
Description:
2
This is my personal planning of paper submissions over year. Once a year I MANUALLY (1) selected the best conferences related to security and measurement, (2) check their deadlines and notification dates of either the previous or the current year, and (3) add some metrics that POTENTIALLY highlight the impact of those venues (h-index and acceptance ratio). The selection of the best conferences and the metrics is based on four source of information: (1) Google scholar metrics (https://scholar.google.com/citations?view_op=top_venues&hl=en&vq=eng_computersecuritycryptography), (2) https://www.cs.ucsb.edu/~almeroth/conf/stats/, (3) http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm and (4) http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking.html. I also classify the venues as 'g' (general security conferences), 'm' (measurement conferences), 'mg' (management), 'io' (industry and operators), c (cripto-related), p (only privacy related) and w (wireless). Note that I remove from my MAIN planning the 'c', 'p', and 'w' by consider not aligned with my current plans. By José Jair Santanna (jairsantanna.com)
3
http://bit.ly/submission_plan
4
SECURITY AND MEASUREMENT COMMUNITY!!!! PLUS SIGCOMM AND USENIX ATC
5
Deadlines (RED) and Notifications (GREEN)
6
typeVenueAcronymh-indexAccept. ratiojanfebmaraprmeijunjulaugsepoktnovdecsort by datesort by h-indexsort by accep.
7
mTraffic Monitoring and Analysis workshopTMA-34%11-jan.26-feb.221
8
gACM SIGCOMMSIGCOMM6415,80%29-jan.22-apr.312
9
gUSENIX Annual Technical ConferenceUSENIZ ATC3618,30%1-feb.15-apr.465
10
gDigital Forensic Research ConferenceDFRWS-34,80%7-feb.1-apr.51922
11
gGI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability AssessmentDIMVA-28,20%8-feb.28-mrt.617
12
gComputer Security Foundations WorkshopCSFW-35%12-feb.8-apr.723
13
gIEEE Computer Security Foundations SymposiumIEEE CSF2226,30%12-feb.8-apr.81212
14
gUsenix Security SymposiumUsenix Security5616,10%18-feb.16-mei933
15
gAustralasia Conference on Information Security and PrivacyACISP1430,90%4-mrt.13-apr.101519
16
gSymposium On Usable Privacy and SecuritySOUPS-26%4-mrt.11-mei1111
17
gInformation Security ConferenceISC-28,70%21-mrt.9-mei1218
18
gInternational Conference on Information and Communications SecurityICICS12-29-mrt.15-apr.1316
19
gInternational Symposium on Recent Advances in Intrusion DetectionRAID-24,60%8-apr.3-jun.149
20
gEuropean Symposium on Research in Computer SecurityESORICS-21,00%22-apr.27-jun.157
21
gIEEE Conference on Communications and Network SecurityCNS928,10%27-apr.1-jul.161816
22
gNew Security Paradigms WorkshopNSPW--29-apr.17-jun.1724
23
mInternet Measurement ConferenceIMC4522,90%12-mei29-jul.1858
24
gACM Conference on Computer and Communications SecurityACM CCS-18,40%24-mei22-jul.196
25
USENIX Workshop on offensive TechnologiesUSENIX WOOT--25-mei23-jun.20
26
gAnnual Computer Security Applications ConferenceACSAC2921,10%8-jun.15-aug.219
27
gInternation Conference on Security and Privacy in Communication NetworksSecureComm-28%21-jun.1-aug.2215
28
gInternational Conference on Malicious and Unwanted SoftwareMALWARE--7-jul.1-sep.23
29
gEuro S&PEuro S&P--6-aug.28-okt.24
30
gISOC Network and Distributed System Security SymposiumNDSS5117,10%16-aug.22-okt.2544
31
gInternational Conference on Information Security and CryptologyICISC12-10-aug.8-okt.2617
32
gACM Conference on Data and Application Security and PrivacyCODASPY24-14-sep.24-nov.2711
33
gACM Symposium on Applied ComputingSAC3127,30%15-sep.10-nov.28714
34
mPassive and Active Measurement ConferencePAM2232,40%16-okt.18-dec.291320
35
gIEEE Symposium on Security and PrivacyIEEE S&P
5912,20%7-feb.3-nov.3021
36
gACM Symposium on Information, Computer and Communications SecurityACM AsiaCCS3125,30%1-feb.20-nov.31810
37
gThe International Conference on Dependable Systems and NetworksIEEE/IFIP DSN2822,80%28-feb.7-dec.32107
38
gInternational Conference on ICT Systems Security and Privacy ProtectionIFIP Sec1626,50%24-feb.23-dec.11413
39
MANAGEMENT COMMUNITY!!!!
40
VenueAcronymh-indexAccept. ratiojanfebmaraprmeijunjulaugsepoktnovdec
41
mgConference on Network and Service ManagementCNSM1917.6%14-jun.22-aug.
42
mgIFIP/IEEE International Symposium on Integrated Network ManagementIM2227.2%4-sep.11-nov.
43
mgIEEE/IFIP Network Operations and Management SymposiumNOMS2128.9%22-sep.20-nov.
44
mgInternational IFIP TC 6 Conference on NetworkingNETWORKING2428.5%3-mrt.1-dec.
45
46
INDUSTRY AND OPERATORS!!!! +Hackers
47
VenueAcronymh-indexAccept. ratiojanfebmaraprmayjunjulagosepoctnovdez
48
ioRSA (call for speakers)n.a.5-aug.
49
ioRIPE (plenary sessions and lightning talk) [2 times] april~march|august~septn.a.13-mrt.28-aug.11-okt.
50
io(NA,NL)NOGn.a.
51
ioTNC TERENAn.a.
52
hBlackhat Europen.a.
53
hDEFCONn.a.
54
55
Excluded venues
56
cInternational Conference on Applied Cryptography and Network SecurityACNS18.4%
57
cEuropean Cryptology ConferenceEurocrypt20.3%
58
cInternational Cryptology ConferenceCrypto21.1%
59
cInternational Conference on the Theory and Application of Cryptology and Information SecurityAsiacrypt16.9%
60
cInternational Workshop on Public-Key CryptographyPKC26.3%
61
cInternational Conference on Financial Cryptography and Data SecurityFC28.1%
62
cWorkshop on Cryptographic Hardware and Embedded SystemsCHES25.6%
63
cRSA Conference, Cryptographers' TrackCT-RSA28.7%
64
cFast Software Encryption workshopFSE30%
65
cTheory of Cryptography ConferenceTCC32.9%
66
pPrivacy Enhancing Technologies SymposiumPETS22.9%
67
wACM Conference on Wireless Network SecurityACM WiSec#REF!
68
69
Prize Nomination
70
Applied Networking Research Prize - IRTF
71
Dutch Cyber Security Research Award
72
Roger Needham award for best Ph.D. in computer systems in Europe
73
SIGOPS Dennis M. Ritchie award
74
Loading...
 
 
 
Submission Planning
About
Journals
Submission Agenda