Conference Information
Security 2022: USENIX Security Symposium
https://www.usenix.org/conference/usenixsecurity22
Submission Date:
2022-02-01
Notification Date:
2022-05-02
Conference Date:
2022-08-10
Location:
Boston, Massachusetts, USA
Years:
31
CCF: a   CORE: a*   QUALIS: a1   Viewed: 41974   Tracked: 179   Attend: 7

Call For Papers
Refereed paper submissions are solicited in all areas relating to systems research in security and privacy, including but not limited to:

    System security
        Operating systems security
        Web security
        Mobile systems security
        Distributed systems security
        Cloud computing security
    Network security
        Intrusion and anomaly detection and prevention
        Network infrastructure security
        Denial-of-service attacks and countermeasures
        Wireless security
    Security analysis
        Malware analysis
        Analysis of network and security protocols
        Attacks with novel insights, techniques, or results
        Forensics and diagnostics for security
        Automated security analysis of hardware designs and implementation
        Automated security analysis of source code and binaries
        Program analysis
    Machine learning security and privacy
    Data-driven security and measurement studies
        Measurements of fraud, malware, spam
        Measurements of human behavior and security
    Privacy-enhancing technologies and anonymity
    Usable security and privacy
    Language-based security
    Hardware security
        Secure computer architectures
        Embedded systems security
        Methods for detection of malicious or counterfeit hardware
        Side channels
    Research on surveillance and censorship
    Social issues and security
        Research on computer security law and policy
        Ethics of computer security research
        Research on security education and training
        Information manipulation, misinformation, and disinformation
        Protecting and understanding at-risk users
        Emerging threats, harassment, extremism, and online abuse
    Applications of cryptography
        Analysis of deployed cryptography and cryptographic protocols
        Cryptographic implementation analysis
        New cryptographic protocols with real-world applications

This topic list is not meant to be exhaustive; USENIX Security is interested in all aspects of computing systems security and privacy. Papers without a clear application to security or privacy of computing systems, however, will be considered out of scope and may be rejected without full review.
Last updated by Dou Sun in 2021-10-16
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
201852410019.1%
20175228516.3%
20164637215.6%
20154266715.7%
20143506719.1%
20132774516.2%
20122224319.4%
20112043517.2%
20102023014.9%
20091762614.8%
20081702715.9%
20071872312.3%
20061792212.3%
20051482214.9%
20041842212%
20031282116.4%
20021302216.9%
2001832428.9%
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cHotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-06-152020-08-11
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
HealthSecUSENIX Workshop on Health Security and Privacy 2012-05-222012-08-06
SNSPInternational Conference on Sensor Networks and Signal Processing2018-10-08 2018-10-28
WCETInternational Workshop on Worst-Case Execution Time 2012-05-202012-07-10
ICPSIEEE International Conference on Industrial Cyber-Physical Systems2020-01-202020-03-312020-06-09
NLPIInternational Conference on NLP & Information Retrieval2021-10-232021-11-302022-04-23
ICNEICInternational Conference on Network Engineering and Intelligent Computing2020-09-162020-09-202020-09-28
SEICEInternational Conference on Software Engineering, Intelligent Computing and Electrocommunication2021-03-142021-03-192021-03-27
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
Related Journals
CCFFull NameImpact FactorPublisherISSN
Journal of Internet Security DDSecure.Net Inc.1206-4890
Infosecurity Elsevier1754-4548
cIET Information Security0.862IET1751-8709
International Journal of Information Security1.822Springer1615-5262
bJournal of Computer Security IOS Press0926-227X
cEURASIP Journal on Information Security Springer1687-417X
bComputers & Security3.579Elsevier0167-4048
IEEE Open Journal of the Computer SocietyIEEE2644-1268
cJournal of Electronic Testing: Theory and Applications0.554Springer0923-8174
IEEE Security & Privacy2.04IEEE1540-7993
Recommendation