(mobo import Concept___Events-migrated) |
Curator 91 (talk | contribs) |
||
(One intermediate revision by one other user not shown) | |||
Line 12: | Line 12: | ||
|Region=California | |Region=California | ||
|Country=Country:US | |Country=Country:US | ||
− | |Academic Field=Computer Reliability;Computer Security | + | |Academic Field=Computer Reliability; Computer Security |
− | |Official Website=https://www.acsac.org/2016/ | + | |Official Website=https://www.acsac.org/2016/cfp/ |
|Type=Conference | |Type=Conference | ||
|Year=2016 | |Year=2016 | ||
− | |||
|pageCreator=Liy1 | |pageCreator=Liy1 | ||
|pageEditor=User:Curator 27 | |pageEditor=User:Curator 27 | ||
Line 23: | Line 22: | ||
{{Event Deadline | {{Event Deadline | ||
|Abstract Deadline=2016/09/01 | |Abstract Deadline=2016/09/01 | ||
+ | |Workshop Deadline=2016/06/01 | ||
|Poster Deadline=2016/09/01 | |Poster Deadline=2016/09/01 | ||
− | |||
|Submission Deadline=2016/06/01 | |Submission Deadline=2016/06/01 | ||
}} | }} | ||
+ | {{Organizer | ||
+ | |Contributor Type=organization | ||
+ | |Organization=Applied Computer Security Associates | ||
+ | }} | ||
+ | {{Event Metric}} | ||
{{S Event}} | {{S Event}} | ||
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. | ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. |
Latest revision as of 09:46, 22 February 2023
Deadlines
|
||
Submission |
|
||
Workshop |
|
||
Abstract |
|
||
Poster |
Metrics
Venue
Los Angeles, California, United States of America
Warning: Venue is missing. The map might not show the exact location.
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
Topics
- Access Control
- Applied Cryptography
- Assurance
- Audit
- Biometrics
- Case studies
- Cloud Security
- Cyber-Physical Systems
- Denial of Service Protection
- Distributed Systems Security
- Electronic Commerce
- Enterprise Security Management
- Evaluation and Compliance
- Forensics
- Identity Management
- Incident Response Planning
- Insider Threat protection
- Integrity
- Intrusion Detection
- Intellectual Property
- Malware
- Mobile/Wireless Security
- Multimedia Security
- Network Security
- OS Security
- P2P Security
- Privacy & Data Protection
- Privilege Management
- Resilience
- Security and Privacy of the Internet of Things Hard Topic Theme!
- Security Engineering
- Software Security
- Supply Chain Security
- Trust Management
- Trustworthy Computing
- Usability and Human-centric Aspects of Security
- Virtualization Security
- Web Security
Submissions
Important Dates
Committees
- Co-Organizers
- General Co Chairs
- some person, some affiliation, country
- PC Co Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country