Difference between revisions of "ACSAC 2016"
Jump to navigation
Jump to search
(modified through wikirestore by orapi) |
(modified through wikirestore by orapi) |
||
| (One intermediate revision by the same user not shown) | |||
| Line 6: | Line 6: | ||
|Workshop deadline=2016/06/01 | |Workshop deadline=2016/06/01 | ||
|Acronym=ACSAC 2016 | |Acronym=ACSAC 2016 | ||
| − | |End date=2016 | + | |End date=2016-12-09 |
|Series=ACSAC | |Series=ACSAC | ||
|Type =Conference | |Type =Conference | ||
| Line 12: | Line 12: | ||
|State=US/CA | |State=US/CA | ||
|City =US/CA/Los Angeles | |City =US/CA/Los Angeles | ||
| + | |Year =2016 | ||
|Homepage=www.acsac.org/2016/cfp/ | |Homepage=www.acsac.org/2016/cfp/ | ||
|Ordinal=32 | |Ordinal=32 | ||
| − | |Start date=2016 | + | |Start date=2016-12-05 |
|Title=32nd Annual Computer Security Applications Conference | |Title=32nd Annual Computer Security Applications Conference | ||
}} | }} | ||
Latest revision as of 04:46, 6 December 2021
Event Rating
| median | worst |
|---|---|
List of all ratings can be found at ACSAC 2016/rating
| ACSAC 2016 | |
|---|---|
32nd Annual Computer Security Applications Conference
| |
| Ordinal | 32 |
| Event in series | ACSAC |
| Dates | 2016-12-05 (iCal) - 2016-12-09 |
| Homepage: | www.acsac.org/2016/cfp/ |
| Location | |
| Location: | US/CA/Los Angeles, US/CA, US |
| Important dates | |
| Workshops: | 2016/06/01 |
| Abstracts: | 2016/09/01 |
| Posters: | 2016/09/01 |
| Submissions: | 2016/06/01 |
| Table of Contents | |
ACSAC is an internationally recognized forum where practitioners, researchers, and developers in information system security meet to learn and to exchange practical ideas and experiences.
Topics
- Access Control
- Applied Cryptography
- Assurance
- Audit
- Biometrics
- Case studies
- Cloud Security
- Cyber-Physical Systems
- Denial of Service Protection
- Distributed Systems Security
- Electronic Commerce
- Enterprise Security Management
- Evaluation and Compliance
- Forensics
- Identity Management
- Incident Response Planning
- Insider Threat protection
- Integrity
- Intrusion Detection
- Intellectual Property
- Malware
- Mobile/Wireless Security
- Multimedia Security
- Network Security
- OS Security
- P2P Security
- Privacy & Data Protection
- Privilege Management
- Resilience
- Security and Privacy of the Internet of Things Hard Topic Theme!
- Security Engineering
- Software Security
- Supply Chain Security
- Trust Management
- Trustworthy Computing
- Usability and Human-centric Aspects of Security
- Virtualization Security
- Web Security
Submissions
Important Dates
Committees
- Co-Organizers
- General Co-Chairs
- some person, some affiliation, country
- PC Co-Chairs
- some person, some affiliation, country
- Workshop Chair
- some person, some affiliation, country
- Panel Chair
- some person, some affiliation, country
- Seminars Chair
- some person, some affiliation, country
- Demonstration Co-Chairs
- some person, some affiliation, country
- some person, some affiliation, country
- Local Organizing Co-Chairs
- some person, some affiliation, country
- Program Committee Members
- some person, some affiliation, country