Resources
READING
Graduate Studies
Confused? Too many questions in mind?
What, why, when, where, who... Thanks to Deepa for hosting this page!... Read here
PhD Studies: What is like a research career?
Managing Your Career as a PhD... Again, thanks to Deepa for hosting this page!... Read here
PhD Proposal: What is like a research career?
Guidelines for Writing an Effective Thesis Proposal... Again, thanks to Deepa for hosting this page!... Read here
More Guide on Topic and Publication
Research Topics: Selecting a research topic for security conference, thanks to Xiali Hei for hosting this page!... Read here
Writing Suggestions: Security conference writing suggestions, thanks to Xiali Hei for hosting this page!... Read here
Publication Venues
Not sure how and where to publish your research?
Publishing Your Research... Again, thanks to Deepa for hosting this page!... Read here
Top Security Venues:
IEEE TIFS Journal
IEEE TDSC Journal
ACM TOPS Journal
IEEE Symposium on Security & Privacy (SSP)
Usenix Security Symposium
NDSS Symposium
ACM CCS
Annual Computer Security Applications Conference - ACSAC
ACM AsiaCCS
ACM Conference on Data and Application Security and Privacy (CODASPY)
European Symposium on Research in Computer Security (ESORICS)
IEEE European Symposium on Security & Privacy (EuroS&P)
ACM ARES
Other Security Venues:
IEEE TrustCom
Australasian Conference on Information Security and Privacy (ACISP)
EAI SecureComm
Usenix Symposium On Usable Privacy and Security (SOUPS)
IEEE Computer Security Foundations Symposium (CSF)
IEEE International Workshop on Information Forensics and Security (WIFS)
IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC)
IoT/Internet Venues:
ACM TIOT Journal
IEEE IOT Journal
ACM TOIT Journal
Other Conferences (with Security Track):
IEEE ICC
IEEE Infocom
IEEE Globecom
IEEE CNS
Privacy Venue:
Annual Conference on Privacy, Security and Trust (PST)
Usable Security/Privacy Venues:
Symposium on Usable Privacy and Security (SOUPS)
European Workshop on Usable Security (EuroUSEC)
CPS Security:
International Conference on Critical Information Infrastructures Security (CRITIS)
ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS)
International Conference on Critical Infrastructure Protection (ICCIP)
International Journal of Critical Infrastructure Protection - Elsevier
ACM Transactions on Cyber-Physical Systems (TCPS)
IEEE Transactions on Sustainable Computing (TSC)
Smart Grid Conferences:
IEEE SmartGridComm
IEEE ISGT
IEEE ISGT Europe
IEEE ISGT Asia
IEEE PES APPEEC
IEEE SEGE
IEEE PES GM
IEEE PowerCon
Resources for Conference Poster and Presentation
Designing and Presenting a Science Poster Click here
How to Create a Research Poster Click here
Scientific Poster Design Click here
How to receive emails from group CyCIS?
You can find it under your "Groups" in left hand side of the tab (that has Inbox, Drafts, Sent Items, etc.) in outlook. Make sure you change this group's settings to "Follow in inbox" -> "Receive all email and events".
Group Seminars
CPS Time Delay Attack in Real-time Co-simulation Environment by Nouman
Efficient Passive ICS Device Discovery and Identification by Yazeed
Towards Distance Relay Attack Discrimination for Situational Awareness by Nouman
Enhancing Cyber Situational Awareness for Cyber-Physical Systems through Digital Twins by Yazeed
Automated Asset Discovery in ICS by Yazeed
Specification Mining for IDS in ICS by Nouman
Situational awareness requirements for operators by Yazeed
Cyber Defense Remediation by Yazeed
If you like Reading Computer Science Resources: check here