SecTrend Analysis

A data-driven analysis on 17,797 security paper from 1980 to 2020.

Following datasets are used to support this analysis. Please feel free to download them.


Security Conferences

level venue wholename link
Tier 1 S&P (Oakland) IEEE Symposium on Security and Privacy https://dblp.uni-trier.de/db/conf/sp/
Tier 1 CCS ACM Conference on Computer and Communications Security https://dblp.uni-trier.de/db/conf/uss/
Tier 1 Security USENIX Security Symposium https://dblp.uni-trier.de/db/conf/ccs/
Tier 1 NDSS ISOC Network and Distributed System Security Symposium https://dblp.uni-trier.de/db/conf/ndss/
Tier 1 Crypto International Cryptology Conference https://dblp.uni-trier.de/db/conf/crypto/
Tier 1 Eurocrypt European Cryptology Conference https://dblp.uni-trier.de/db/conf/eurocrypt/
Tier 2 ESORICS European Symposium on Research in Computer Security https://dblp.uni-trier.de/db/conf/esorics/
Tier 2 RAID International Symposium on Recent Advances in Intrusion Detection https://dblp.uni-trier.de/db/conf/raid/
Tier 2 ACSAC Annual Computer Security Applications Conference https://dblp.uni-trier.de/db/conf/acsac/
Tier 2 DSN The International Conference on Dependable Systems and Networks https://dblp.uni-trier.de/db/conf/dsn/
Tier 2 IMC Internet Measurement Conference https://dblp.uni-trier.de/db/conf/imc/
Tier 2 ASIACCS ACM Symposium on Information, Computer and Communications Security https://dblp.uni-trier.de/db/conf/asiaccs/
Tier 2 PETS Privacy Enhancing Technologies Symposium https://dblp.uni-trier.de/db/conf/pet/
Tier 2 EuroS&P IEEE European Symposium on Security and Privacy https://dblp.uni-trier.de/db/conf/eurosp/
Tier 2 CSF (CSFW) IEEE Computer Security Foundations Symposium. Supersedes CSFW (Computer Security Foundations Workshop) https://dblp.uni-trier.de/db/conf/csfw/
Tier 2 Asiacrypt International Conference on the Theory and Application of Cryptology and Information Security https://dblp.uni-trier.de/db/conf/asiacrypt/
Tier 2 TCC Theory of Cryptography Conference https://dblp.uni-trier.de/db/conf/tcc/
Tier 2 CHES Conference on Cryptographic Hardware and Embedded Systems https://dblp.uni-trier.de/db/conf/ches/

Dataset Description

venue tier item_cnt paper_cnt min(year) max(year) year_cnt proceedings_cnt
CCS Tier 1 2179 2073 1993 2019 26 26
Crypto Tier 1 1266 1234 1981 2012 32 32
Eurocrypt Tier 1 1252 1220 1982 2014 33 32
NDSS Tier 1 853 829 1995 2019 25 25
S&P (Oakland) Tier 1 1548 1499 1980 2019 40 49
Security Tier 1 1779 1696 1993 2019 25 83
ACSAC Tier 2 1345 1304 1989 2019 30 34
ASIACCS Tier 2 846 832 2006 2019 14 14
Asiacrypt Tier 2 798 777 1990 2014 23 21
CHES Tier 2 639 618 1999 2018 20 21
CSF (CSFW) Tier 2 750 714 1988 2019 32 35
DSN Tier 2 1936 1841 2000 2019 20 37
ESORICS Tier 2 1014 971 1990 2020 25 43
EuroS&P Tier 2 253 246 2016 2019 4 7
IMC Tier 2 772 753 2001 2019 19 19
PETS Tier 2 227 213 2002 2014 13 13
RAID Tier 2 539 515 1999 2019 21 23
TCC Tier 2 477 462 2004 2016 12 15

Keywords of Tier1 Conferences

year cnt top1 top2 top3 top4 top5 top6 top7 top8 top9 top10 top11 top12 top13 top14 top15 top16 top17 top18 top19 top20 top21 top22 top23 top24 top25 top26 top27 top28 top29 top30
1980 19 secur system preliminari safeguard key data report cryptosystem deceit describ gf qm transbord problem scheme base knapsack master pervas logarithm aspect facil threshold kernel compact demonstr exist step three difficulti
1981 18 secur system protect fund half lead loaf none restricit problem flow inform multiprocessor suffici process well criteria might militari model kernel messag assign defin transfer appli futur transport integr better
1982 20 secur allianc blindfold conseqeu cryptanalyt memoryless neval obm oskar restitut sacur signitur protect arbitr innov total form preliminari concept pool acceler goal overcom commun area split surveil channel practic databas
1983 21 secur system encrpyt indentif modifi sdc treati veru problem integ minimum theme variat multilevel note provis retrospect evalu guard recent variou algorithm assign joint tcb code verif complianc pad switch
1984 26 secur formal comput system experi bell congression euclid lapadula mcf mm multinet ottawa pend unwind ada checksum interrog iv legisl linu sri statement traceabl multilevel de individu retrospect age built
1985 25 ada verif system overview secur databas comput acycl america commut conceptu controlin gypsi honeywel inequ polonium quadrat scomp trustabl unif issu attenu conflict consider onto ssr statist network allow dbm
1986 23 secur xenix system use global comput ina jo keykostm muse owner sat sector unreli databas absenc affect matchmak workstat design schemat special anoth guard militari ml top extend avail addit
1987 26 secur multilevel system covert abyss comparti formul subsystem visa μabyss channel relat believ hors workstat capac damag militari model specif invari code basi dual net overview potenti consist homomorph natur
1988 24 secur seaview system multilevel databas apo commerci model asdview axiomat reverif smite relat cascad expert microprocessor virus comput distribut mandatori specif toler infer basi concern denial switch discretionari integr manag
1989 33 secur model polici viru system unix distribut allergi incorpor merg novemb part subject sum summari trak tuni tweezer unchart fact immedi ipc mediat microscop narrow pass suppress tea cell central
1990 34 secur vmm system multilevel architectur data knowledg kernel use model verif aso cartesiana microprogram pale polyinstanti referenti vax formal construct databas inform armi conundrum deduct littl nondeterminist audit form goe
1991 28 channel model system analysi time secur flow covert distribut verif ban buzzword microdata nondisclosur spx queri relat inform epidemiolog ide sri taxonomi term variabl statist approach decomposit higher mathemat schemat
1992 22 secur system multilevel concurr databas solut apo blacker ddn ideal problem transact snapshot decomposit upon protocol distribut alloc criteria influenc trade delay matrix orient lattic schedul denial natur procedur window
1993 61 secur unix protocol authent distribut system interconnect requir environ logic design key signatur multilevel denial author relationship assur network cryptanalysi cryptograph internet access commun model atp cryptolib edi ftp mach
1994 50 secur protocol system condit escrow composit channel model elimin function cryptograph requir distribut amok disenrol gifford interrel prerequisit tabular tripwir gener broadcast servic inform engin convert discrimin endors insur lan
1995 59 secur system network kerbero internet object protocol architectur domain firewal issu panel multilevel version audit manag enforc key unix use global requir model absorb adrift aix autohack bottom corba mlr
1996 74 secur system key protocol distribut signatur versatil atm network panel control author fair support educ email public cryptanalysi payment framework access develop commun anarchist babel bankcard bump cryptovirolog encryptor helper
1997 61 secur system rout calculu protocol concept attack author fair flaw kerbero configur key password analysi dynam authent proactiv bin catalyt escort espionag fatal larger mbone misplac nimrod postur scout segreg
1998 76 secur protocol java system detect key network attack distribut atm polici effici mobil fair certif implement group support ipsec internet trust adapt stack apo bean di dte equip hostil intermedi
1999 83 secur twenti year network futur intrus password detect signatur system quot protocol toolkit rsa use privat misus distribut softwar scheme base bgp group key harden ipsec multicast technolog unix analysi
2000 91 secur use protocol detect confin multicast infrastructur step privaci java system sourc coprocessor effici technolog virtual certif intrus enhanc applic web realli signatur issu attack first access author kerbero encrypt
2001 89 secur authent system detect protocol file key method kerbero manag analysi network cryptograph group trust string vulner protect flexibl publish client effici abstract control certifi access new constraint format negoti
2002 85 detect intrus secur attack network use anonym system analysi linux authent placement manag tl web framework key packet hook protocol alert gener modul partial ssh certif implement encrypt mix correl
2003 93 attack secur detect effici use sensor key buffer system static interdomain pairwis distribut signatur analysi network overflow traffic authent ddo intrus scheme defend vulner protect improv avail pki call memori
2004 103 secur detect attack system use encrypt do network intrus effect filter worm graphic reusabl authent access architectur web design signatur puzzl alert futur runtim rfid static integr scheme automat buffer
2005 100 attack secur worm detect use network automat analysi distribut troubleshoot sensor gener authent vulner autom applic effici system exploit polymorph proxi improv ieee internet signatur caus effect fast new counter
2006 134 secur detect system analysi gener vote network data attack short paper web replay spywar use applic hidden automat approach intrus authent practic abstract browser privaci signatur polici ballot exploit resili
2007 173 attack vote secur network system deter detect malwar analysi use ballot testb vulner gener web exploit privaci audit inform automat quot encrypt anonym spam denial unifi softwar dynam fingerprint optim
2008 171 secur network vote system attack analysi toward anonym verifi engin defens elect practic automat effici optic use malwar protocol via gener web testb robust revers exploit audit encrypt model experi
2009 158 vote secur use attack web detect botnet effici rfid network defens data privaci system leak applic automat malwar voter script analysi paper testb robust inform comput traffic social avc tor
2010 250 secur attack web network system social applic spam detect malwar use health privaci effici vulner elect data analysi browser anonym automat cloud onlin protect javascript framework polici base control aggreg
2011 272 secur attack privaci web detect analysi system use cloud malwar vulner applic network inform encrypt medic measur automat censorship onlin data exploit control android scalabl anonym comput devic social mobil
2012 338 attack secur privaci network web android system malwar detect data cloud analysi social apo tor user toward onlin use applic inform semant comput evalu effici practic protocol smartphon mobil measur
2013 381 secur android attack data network web use detect privaci analysi comput system insid applic practic devic evalu malwar censorship mobil effici toward circuit apo automat oblivi protocol integr threat user
2014 407 secur attack android data detect malwar privaci web use analysi network applic system practic password vulner encrypt insid cloud malici autom devic apo mobil code threat toward app comput state
2015 376 secur attack android privaci app detect data vulner code cloud applic studi bitcoin exploit tl automat use web apo protect analysi encrypt user network cach integr memori circuit comput authent
2016 459 secur android attack analysi detect malwar data mobil network privaci applic differenti system practic toward vulner authent learn tl apo user app studi devic privat via use gener cybersecur comput
2017 502 attack secur detect android privaci vulner network learn analysi via practic use sgx malwar apo privat mobil system measur effici differenti enclav onlin exploit evil toward autom encrypt tor verifi
2018 542 secur attack learn deep android detect use network analysi adversari privaci apo studi toward neural system iot data practic user quot gener cybersecur via app web encrypt fingerprint threat differenti
2019 590 attack secur privaci adversari learn apo neural deep iot fuzz network detect smart data studi vulner use app analysi system evalu understand via cryptocurr applic web blockchain user measur differenti

Keywords of Tier2 Conferences

year cnt top1 top2 top3 top4 top5 top6 top7 top8 top9 top10 top11 top12 top13 top14 top15 top16 top17 top18 top19 top20 top21 top22 top23 top24 top25 top26 top27 top28 top29 top30
1988 16 secur inform model tranquil unansw express gypsi approach degre hook schemat theft question specifi permiss flow protect formal deriv increas analysi insecur polici quantit need command definit knowledg compon sensit
1989 73 secur system subset tcb trust multilevel develop cal gemso issu summari integr data databas logist process approach design acquisit lan consist air model support comput protect risk network panel distribut
1990 86 secur system multilevel model trust comput profession databas network control applic manag distribut inform unix base evalu epistem formal protocol relat access progress process softwar ml orient apo logic criteria
1991 54 secur polyinstanti multilevel system model analysi use protocol discuss databas depend consider channel integr panel posit bell hors inevit infeas nonparametr rebu salient teller virtu high problem paper abduct computer
1992 66 secur multilevel system analysi comput distribut model transit protocol architectur authent formal use method process ml approach databas trust interoper panel access control polici sourc amac amc asax cat cautionari
1993 43 secur ml multilevel model system protocol represent panel compusec cosignatur dbmss devis multiview rational theme unhappi workstat prototyp allianc canadian describ display involv mathemat mental procur rdbm approach databas applic
1994 77 secur system multilevel databas model approach editori mitr protocol authent network inform privileg perimet architectur analysi use perform practic vs control interfac confidenti view ml integr open taxonomi comput design
1995 16 secur system specifi protocol authentif cscw fdr loral mclean ulyss properti higher synthet compos control model decompos discretionari epistem verifi guess individu checker clock interfer represent resolut logic csp key
1996 71 secur protocol payment system purs model electron nrl multilevel quot two internet authent control databas formal proxi distribut use analyz convinc edi esign fortezza genealog german gni hanscom hol immunolog
1997 47 secur protocol multilevel system commerc assur type applic authent electron bastion casper doc dss hajj pcasso saudi virgil wyatt enforc effici technolog canon dod ethic sdsi unattend architectur comput firewal
1998 78 secur system detect protocol model applet distribut authent network electron java panel analysi multilevel intrus atm fair comput databas commerc payment mobil scheme servic introduct architectur data key applic use
1999 123 detect secur intrus system network analysi attack protocol architectur use finit id certif applic basi de access model gener build design nt field cryptograph new fast atm manag servic multipl
2000 190 secur system use detect network protocol analysi fault control access applic depend gf approach intrus base model architectur data mobil toler power attack softwar certif reliabl comput implement code cot
2001 198 secur system detect fault network perform intrus attack algorithm implement internet alert distribut use model ellipt softwar protocol measur analysi rijndael curv toler approach architectur data design traffic applic multipl
2002 288 system analysi detect secur use network attack model intrus internet evalu traffic softwar measur fault curv depend perform ellipt privaci random toler backbon inform tool control gf architectur data applic
2003 252 system secur detect network analysi model fault attack depend intrus use perform data algorithm failur applic protocol privaci evalu control internet implement measur distribut toler base number design rout hardwar
2004 330 system network detect secur attack analysi fault depend applic use comput traffic intrus data model implement servic algorithm reliabl worm design control effici measur protocol toler transfer inform rout flow
2005 335 secur system network attack detect model analysi committe distribut use intrus wireless protocol base error privaci comput data failur traffic approach confer encrypt code worm monitor applic depend adapt evalu
2006 383 secur system attack network analysi detect use privaci depend model effici architectur access framework gener control random intrus protocol base key oracl distribut approach comput perform sampl scheme automat messag
2007 392 secur network system attack analysi use servic detect protocol control model data effici dynam encrypt authent depend privaci access approach fault traffic monitor key distribut inform web tube rout rfid
2008 377 secur attack detect network system analysi protocol use control applic effici fault anomali signatur anonym base servic error depend approach toward model scheme abstract privaci architectur rfid improv evalu extend
2009 420 network secur system detect attack privaci use analysi dynam applic protocol social base servic polici depend onlin control function inform effici comput data encrypt gener anonym authent botnet model intrus
2010 424 network secur detect analysi use system fault effici base privaci data anonym attack protocol social monitor model comput toler effect hardwar toward framework applic web softwar approach error encrypt improv
2011 433 secur attack detect use system network analysi privaci malwar cloud data web dynam model social fault effici signatur privat comput memori protocol approach key encrypt virtual depend applic function random
2012 439 secur analysi network attack cloud system detect effici privaci data model use toward protocol privat abstract encrypt social function program error scheme resili practic monitor measur malwar fault differenti authent
2013 437 secur system network cloud attack comput analysi use data android privaci detect applic encrypt malwar model virtual devic effici control fault mobil web dynam practic evalu measur via understand memori
2014 391 secur attack network android system cloud privaci analysi detect malwar use applic social evalu data measur web virtual fault toward autom effici model studi program leakag vulner failur understand encrypt
2015 394 attack secur system analysi detect android use data privaci control network effici mobil cloud applic program devic softwar binari app base integr code encrypt hardwar keynot protect improv model character
2016 546 secur analysi attack encrypt cloud android system effici obfusc app detect comput function network data use code malwar privaci applic via control model ram fault dynam authent practic secret protect
2017 456 secur attack android system detect analysi use blockchain data encrypt network cloud app control toward authent malwar evalu applic measur privaci effici model case studi industri binari mobil internet malici
2018 527 secur detect attack system use network cloud analysi data iot learn machin privaci deep blockchain base neural control model android toward malwar measur via studi practic authent internet framework error
2019 507 attack secur network system use iot detect analysi neural malwar data privaci blockchain applic control devic model deep adversari studi android via vulner toward measur base framework approach protect protocol