Curator 90 (talk | contribs) |
(mobo import Concept___Events-migrated) |
||
Line 6: | Line 6: | ||
|Acronym=ACSAC 2016 | |Acronym=ACSAC 2016 | ||
|Type=Conference | |Type=Conference | ||
− | |Country=US | + | |Country=Country:US |
|State=US/CA | |State=US/CA | ||
|City=US/CA/Los Angeles | |City=US/CA/Los Angeles | ||
Line 13: | Line 13: | ||
|Ordinal=32 | |Ordinal=32 | ||
|Title=32nd Annual Computer Security Applications Conference | |Title=32nd Annual Computer Security Applications Conference | ||
− | |||
|pageCreator=Liy1 | |pageCreator=Liy1 | ||
|pageEditor=User:Curator 27 | |pageEditor=User:Curator 27 | ||
Line 22: | Line 21: | ||
|End Date=2018-12-06 | |End Date=2018-12-06 | ||
|Academic Field=Computer Security;Computer Reliability | |Academic Field=Computer Security;Computer Reliability | ||
+ | |Event Status=as scheduled | ||
+ | |Event Mode=presence | ||
}} | }} | ||
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. | ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences. |
Revision as of 13:35, 6 September 2022
"None" contains an extrinsic dash or other characters that are invalid for a date interpretation.
"None" contains an extrinsic dash or other characters that are invalid for a date interpretation."Error: Invalid time." is not a number. "Error: Invalid time." is not a number.
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
Topics
- Access Control
- Applied Cryptography
- Assurance
- Audit
- Biometrics
- Case studies
- Cloud Security
- Cyber-Physical Systems
- Denial of Service Protection
- Distributed Systems Security
- Electronic Commerce
- Enterprise Security Management
- Evaluation and Compliance
- Forensics
- Identity Management
- Incident Response Planning
- Insider Threat protection
- Integrity
- Intrusion Detection
- Intellectual Property
- Malware
- Mobile/Wireless Security
- Multimedia Security
- Network Security
- OS Security
- P2P Security
- Privacy & Data Protection
- Privilege Management
- Resilience
- Security and Privacy of the Internet of Things Hard Topic Theme!
- Security Engineering
- Software Security
- Supply Chain Security
- Trust Management
- Trustworthy Computing
- Usability and Human-centric Aspects of Security
- Virtualization Security
- Web Security
Submissions
Important Dates
Committees
- Co-Organizers
- General Co Chairs
- some person, some affiliation, country
- PC Co Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country