Welcome to the 27th Annual Computer Security Applications Conference (ACSAC). Since last held in Orlando nearly two decades ago, ACSAC continues to be recognized as one of the leading security events in the world, and is one of the longest-running events in the field. Our unique blend of learning and networking, with equal participation from industry, government, and academia, has served as a forum for groundbreaking new work as well as fostered discussion on immediately applicable security techniques.
Every year, ACSAC receives hundreds of submissions from around the world. The technical papers are peer-reviewed by leading experts in the security field in a double-blind process to ensure fairness, and the very best are accepted for presentation and inclusion in the proceedings. Leading this effort for 2011 is program chair John McDermott along with co-chair Michael Locasto, both of whom have done an outstanding job to ensure a quality program across a diverse range of security topics - from social network security and applied cryptography to situational awareness and mobile security.
Cited By
- Ren K, Qiang W, Wu Y, Zhou Y, Zou D and Jin H An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, (1420-1432)
-
Peng W, Li F and Zou X (2014). Moving Target Defense for Cloud Infrastructures: Lessons from Botnets High Performance Cloud Auditing and Applications, 10.1007/978-1-4614-3296-8_2, (35-64),
Index Terms
- Proceedings of the 27th Annual Computer Security Applications Conference