ACSAC 2018 : Computer Security Applications Conference

  in Conferences   Posted on March 8, 2018

Conference Information

Submission Deadline Friday 08 Jun 2018
Conference & Submission Link https://www.acsac.org/
Conference Dates Dec 3, 2018 - Dec 7, 2018
Conference Address Puerto Rico, Puerto Rico
Proceedings indexed by
Conference Organizers : ( Deadline extended ? Click here to edit )

Conference Ranking & Metrics (This is a TOP Conference)

Google Scholar H5-index: 29
CORE 2017 Rating: Aus
Guide2Research Overall Ranking: 122
Category Rankings
Computer Security and Cryptography 12

Conference Call for Papers

When are papers due?
The deadline for submitting papers is June 8 (23:59:59 PST). Authors will be notified of acceptance by August 23. Early reject notifications will be sent tentatively by July 24.
What format should the paper be in?
Please ensure that your submission is a PDF file of a maximum of 10 pages, excluding well-marked references and appendices limited to 5 pages. Submissions must be generated using the ACM 2017 acmart template available at https://www.acm.org/publications/proceedings-template, using the [sigconf, anonymous] options. Submissions should not use older ACM templates (e.g., sig-alternate). Committee members are not required to read the appendices. All submissions must be anonymous (i.e., papers should not contain author names or affiliations, or obvious citations). In the rare case that citing previous work in the 3rd person is impossible, blind the reference and notify the Program Chairs.

Both of these constraints (page limit and anonymity) are hard constraints. Submissions not meeting these guidelines risk rejection without consideration of their merits.
What should I propose a paper on?
If you are developing practical solutions to problems relating to protecting commercial enterprises\’ or countries\’ information infrastructures, consider submitting your work to the Annual Computer Security Applications Conference. We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned.

Special consideration will be given to papers that discuss system implementation, deployment, and lessons learned.