Description

ACSAC brings together cutting edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, workshops, and professional development and training courses, ACSAC continues its core mission of investigating practical solutions for computer security technology.

This year ACSAC will be held at the Condado Plaza Hilton in San Juan, Puerto Rico. Centrally located in the trendy Condado Beach area, near historic Old San Juan, the hotel is an ideal location to both attend the conference and spend time relaxing and sightseeing in the warm tropical weather.

Hard Topic Theme: Big Data *for* Security

The security industry is rapidly amassing an incredible amount of information that can be mined for vulnerabilities and allow researchers to observe phenomena that can play an important role in many other aspects of security, from analytics and intelligence support, to training automated classification and reasoning techniques. However, using large datasets in security also faces many technical and scientific challenges. Therefore, we need to design new data-driven techniques and we need to rethink our existing solutions to take advantage of this vast amount of information to improve security. See the Call for Submissions for more information about submitting to the hard topic theme. I encourage everyone to submit timely work on the topic, and look forward to hearing about results at this year's conference.

Call for paper

Topics of submission

We are especially interested in submissions that address the application of security technology, the implementation of systems, and lessons learned. Some example topics are:

  • Access Control
  • Anonymity
  • Applied Cryptography
  • Assurance
  • Audit
  • Big Data *for* Security (Hard Topic Theme!)
  • Biometrics
  • Security case studies
  • Cloud Security
  • Cyber-Physical Systems
  • Denial of Service Protection
  • Distributed Systems Security
  • Embedded Systems Security
  • Enterprise Security Management
  • Evaluation and Compliance
  • Digital Forensics
  • Identity Management
  • Incident Response
  • Insider Threat protection
  • Integrity
  • Intrusion Detection
  • Intellectual Property
  • Malware
  • Mobile/Wireless Security
  • Multimedia Security
  • Network Security
  • OS Security
  • P2P Security
  • Privacy & Data Protection
  • Privilege Management
  • Resilience
  • Security and Privacy of the Internet of Things
  • Security Engineering
  • Software Security
  • Supply Chain Security
  • Trust Management
  • Trustworthy Computing
  • Usability and Human-centric Aspects of Security
  • Virtualization Security
  • Web Security

Message

Leave a message

Refresh

Contact information

  • hhr@mitre.org

Sponsored By

  • The Applied Computer Security Associates (ACSA)