想要了解最新的学术研究动态,时刻track顶级的会议,顶级的workshop,顶级的researcher都是必要的。
添加了自己需要的会议最新日期,以及最新结束会议。并收集它们的论文集。
下面就是参考别人的表格,自己汇总的一个表格,根据会议的CIF( Conference Impact Factor )进行排列,不一定权威。将不定期更新
还有CCF的推荐:CCF推荐
网络与信息安全:点击打开链接
RK | Conference | Lasted updated | ||
R1 | 1、IEEE S&P IEEE Symposium on Security and Privacy |
| 2015 5.18-5.20 | |
2、Usenix Sec Usenix Security Symposium | 2015 5.18-5.20 | |||
3、ACM CCS ACM Conference on Computer and Communications Security | 2014 11.3-11.7 http://www.sigsac.org/ccs/CCS2014/ ccs2013下载 | |||
4、Crypto International Cryptology Conference | 2014 8.17-21【done】 http://www.iacr.org/conferences/crypto2014/ 论文集下载 | |||
European Cryptology Conference | 2015 4.26-30 | |||
6、NDSS ISOC Network and Distributed System Security Symposium | 2015 2.8-11 | |||
R2 | 7、ESORICS European Symposium on Research in Computer Security | 2014 9.7-11【done】 http://esorics2014.pwr.wroc.pl/ 论文集下载 | ||
8、RAID International Symposium on Recent Advances in Intrusion Detection | 2014 9.17-19【done】 论文集下载 | |||
9、ACSAC Annual Computer Security Applications Conference | 2014 11.8-12 | |||
10、DSN The International Conference on Dependable Systems and Networks | 2015 6.22-25 | |||
11、CSF(CSFW) IEEE Computer Security Foundations Symposium (Computer Security Foundations Workshop) | 2014 7.19-22【done】 | |||
12、TCC Theory of Cryptography Conference | 2014 2.24-26【done】 | |||
13、Asiacrypt International Conference on the Theory and Application of Cryptology and Information Security |
| 2014 12.7-11 | ||
14、IMC Internet Measurement Conference |
| 2014 11.5-7 | ||
R3 | 15、SecureComm IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks | 2014 9.24-26【done】 | ||
16、DIMVA GISIG SIDAR Conference on Detection of Intrusions and Malware and VulnerabilityAssessment http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/ | 2014 7.10-11【done】 | |||
17、AsiaCCS ACM Symposium on Information, Computer and Communications Security | 2015 4.14-17 | |||
18、ACNS International Conference on Applied Cryptography and Network Security | 2015 6.2-5 | |||
19、FC International Conference on Financial Cryptography and Data Security | 2015 1.26-30 |
| ||
20、SAC ACM Symposium on Applied Computing | 2015 4.13-17 | |||
21、ACISP Australasia Conference on Information Security and Privacy | 2014 7.7-9【done】 | |||
22、ICICS International Conference on Information and Communications Security | 2014 12.16-17 | |||
23、ICISC InternationalConference on Information Security and Cryptology | 2014 12.3-5 | |||
24、SACMAT ACM Symposium on Access Control Models and Technologies | 2015 6.1-3 | |||
25、WiSec ACM Conference on Wireless Network Security and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks) |
| 2014 7.23-25【done】 | ||
26、SOUPS Symposium On Usable Privacy and Security | 2015 7.22-24 | |||
27、MALWARE International Conference on Malicious and Unwanted Software |
| 2014 10.28-30 | ||
28、CODASPY ACM Conference on Data and Application Security and Privacy | 2015 3.2-4 |
Workshop
| Workshop on Cryptographic Hardware and Embedded Systems |
|
|
| USENIX Workshop on Large-scale Exploits and Emergent Threats and WORM (ACM Workshop on Recurring/Rapid Malcode) |
|
|
CIF Reference:
http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking.html
Reference Ranking:
http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm