In reviewing each talk or paper consider the following


Assignment - Infosec Conferences

Summary The world of information security conferences is split into two quite distinct streams - A) academic and B) industry/hacker. The purpose of Assignment is to introduce you to these, and to allow you to explore contemporary research in both streams.

Pick two conference talks or papers, one from a Group A conference and one from a Group B conference. Summarize and review each paper. Each summary and review should be 1200 - 1500 words long. Finally, add 500 - 1000 words summarizing the differences you have discovered between the two types of conferences and their submissions.

In reviewing each talk or paper, consider the following questions:

• What is the major contribution of the paper, in your opinion? Is it the same as the authors believe it to be? How significant is it?

• How original is the work? Does it report on a new and original idea?

• Who is the intended audience for this paper?

• Does the paper represent a platform for future work? Can readers or conference attendees use the ideas presented in their own work?

• The paper was accepted, or we would not be considering it here. Should it have been?

Group A: Academic Conferences

IEEE Conference on Communications and Network Security

2013: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=30457

2014: https://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=31964

2015: https://cns2015.ieee-cns.org/

IEEE TrustCom (IEEE International Conference on Trust, Security and Privacy in Computing and Communications)

2013: https://anss.org.au/trustcom2013/

2014: https://www.greenorbs.org/TrustCom2014/

2015: https://research.comnet.aalto.fi/Trustcom2015/

ACM SACMAT (Symposium on Access Control Models and Technologies)

2013: https://www.sacmat.org/2013/index.php

2014: https://www.sacmat.org/2014/index.php

2015: https://www.sacmat.org/2015/index.php

ACM CCS (Conference on Computer and Communications Security)

2013: https://www.sigsac.org/ccs/CCS2013/

2014: https://www.sigsac.org/ccs/CCS2014/

2015: https://www.sigsac.org/ccs/CCS2015/

Crypto

Proceedings are online at

2013: https://www.iacr.org/conferences/crypto2013/

2014: https://www.iacr.org/conferences/crypto2014/

2015: https://www.iacr.org/conferences/crypto2015/

Talks online at https://www.iacr.org/proceedings/ and via SpringerLink

Group B: Industry and Hacker Conferences

Chaos Communications Congress

2013: https://media.ccc.de/browse/congress/2013/

2014: https://media.ccc.de/browse/congress/2014/

2015: https://media.ccc.de/c/32c3

Black Hat (US)

2013: https://www.blackhat.com/us-13/archives.html

2014: https://www.blackhat.com/us-14/archives.html

2015: https://www.blackhat.com/us-15/briefings.html.

Request for Solution File

Ask an Expert for Answer!!
Dissertation: In reviewing each talk or paper consider the following
Reference No:- TGS01422827

Expected delivery within 24 Hours