想要了解最新的学术研究动态,时刻track顶级的会议,顶级的workshop,顶级的researcher都是必要的。
添加了自己需要的会议最新日期,以及最新结束会议。并收集它们的论文集。
下面就是参考别人的表格,自己汇总的一个表格,根据会议的CIF( Conference Impact Factor )进行排列,不一定权威。将不定期更新
RK |
Conference |
Lasted updated |
||
R1 |
1、IEEE S&P IEEE Symposium on Security and Privacy |
|
2015 5.18-5.20 |
|
2、Usenix Sec Usenix Security Symposium |
2015 5.18-5.20 |
|||
3、ACM CCS ACM Conference on Computer and Communications Security |
2014 11.3-11.7 |
|||
4、Crypto International Cryptology Conference |
2014 8.17-21【done】 http://www.iacr.org/conferences/crypto2014/ 论文集下载 |
|||
European Cryptology Conference |
2015 4.26-30 |
|||
6、NDSS ISOC Network and Distributed System Security Symposium |
2015 2.8-11 |
|||
R2 |
7、ESORICS European Symposium on Research in Computer Security |
2014 9.7-11【done】 http://esorics2014.pwr.wroc.pl/ 论文集下载 |
||
8、RAID International Symposium on Recent Advances in Intrusion Detection |
2014 9.17-19【done】 论文集下载 |
|||
9、ACSAC Annual Computer Security Applications Conference |
2014 11.8-12 |
|||
10、DSN The International Conference on Dependable Systems and Networks |
2015 6.22-25 |
|||
11、CSF(CSFW) IEEE Computer Security Foundations Symposium (Computer Security Foundations Workshop) |
2014 7.19-22【done】 |
|||
12、TCC Theory of Cryptography Conference |
2014 2.24-26【done】 |
|||
13、Asiacrypt International Conference on the Theory and Application of Cryptology and Information Security |
|
2014 12.7-11 |
||
14、IMC Internet Measurement Conference |
|
2014 11.5-7 |
||
R3 |
15、SecureComm IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks |
2014 9.24-26【done】 |
||
16、DIMVA GISIG SIDAR Conference on Detection of Intrusions and Malware and VulnerabilityAssessment http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/ |
2014 7.10-11【done】 |
|||
17、AsiaCCS ACM Symposium on Information, Computer and Communications Security |
2015 4.14-17 |
|||
18、ACNS International Conference on Applied Cryptography and Network Security |
2015 6.2-5 |
|||
19、FC International Conference on Financial Cryptography and Data Security |
2015 1.26-30 |
|
||
20、SAC ACM Symposium on Applied Computing |
2015 4.13-17 |
|||
21、ACISP Australasia Conference on Information Security and Privacy |
2014 7.7-9【done】 |
|||
22、ICICS International Conference on Information and Communications Security |
2014 12.16-17 |
|||
23、ICISC InternationalConference on Information Security and Cryptology |
2014 12.3-5 |
|||
24、SACMAT ACM Symposium on Access Control Models and Technologies |
2015 6.1-3 |
|||
25、WiSec ACM Conference on Wireless Network Security and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks) |
|
2014 7.23-25【done】 |
||
26、SOUPS Symposium On Usable Privacy and Security |
2015 7.22-24 |
|||
27、MALWARE International Conference on Malicious and Unwanted Software |
|
2014 10.28-30 |
||
28、CODASPY ACM Conference on Data and Application Security and Privacy |
2015 3.2-4 |
Workshop
|
Workshop on Cryptographic Hardware and Embedded Systems |
|
|
|
USENIX Workshop on Large-scale Exploits and Emergent Threats and WORM (ACM Workshop on Recurring/Rapid Malcode) |
|
|
CIF Reference:
http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking.html
Reference Ranking:
http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
原文地址:http://blog.csdn.net/ls1160/article/details/39618669