【CCF会议期刊推荐】CCF推荐国际学术期刊/会议(网络与信息安全)

欢迎订阅本专栏:《CCF会议期刊推荐》

专栏介绍: 中国计算机学会(CCF)2019年发布了推荐的国际学术会议、期刊目录,共有:计算机体系结构/并行与分布计算/存储系统计算机网络网络与信息安全软件工程/系统软件/程序设计语言数据库/数据挖掘/内容检索计算机科学理论计算机图形学与多媒体人工智能人机交互与普适计算交叉/综合/新兴等10个分类。
本专栏收集、整理了2019年版(后续会更新2023年版)CCF推荐的国际学术会议期刊列表,欢迎 人工智能、信息安全、计算机、软件工程等相关专业 的小伙们 一键三连(收藏❤️、点赞👍、评论⭐) ,欢迎大家👉👉👉【订阅专栏】👈👈👈

CCF推荐国际学术会议、期刊列表:

CCF全称是China Computer Federation,中文意为:中国计算机学会,前身是中国电子学会计算机专业委员会,成立于1962年。CCF每年会发布一系列高水平期刊目录,从而指导科研工作者选择投稿期刊。值得注意的是,CCF推荐的期刊并非全部是SCI索引收录期刊,因此在投稿的过程中还需要仔细甄别。并且CCF推荐的期刊也并非都拥有很高的分区和影响因子。因此,在投稿的时候还需要自己仔细甄别选择。然而,CCF推荐期刊纵使没有较高的分区和影响因子,其学术水平也一定是较高的。

中国计算机学会推荐国际学术期刊

(网络与信息安全)

一、A类

序号刊物简称刊物全称出版社网址
1TDSCIEEE Transactions on Dependable and Secure ComputingIEEEhttp://dblp.uni-trier.de/db/journals/tdsc/
2TIFSIEEE Transactions on Information Forensics and SecurityIEEEhttp://dblp.uni-trier.de/db/journals/tifs/
3Journal of CryptologySpringerhttp://dblp.uni-trier.de/db/journals/joc/

二、B类

序号刊物简称刊物全称出版社网址
1TOPSACM Transactions on Privacy and SecurityACMhttps://tops.acm.org/
2Computers & SecurityElsevierhttp://dblp.uni-trier.de/db/journals/compsec/
3Designs, Codes and CryptographySpringerhttp://dblp.uni-trier.de/db/journals/dcc/
4JCSJournal of Computer SecurityIOS Presshttp://dblp.uni-trier.de/db/journals/jcs/

三、C类

序号刊物简称刊物全称出版社网址
1CLSRComputer Law and Security ReviewElsevierhttp://www.journals.elsevier.com/computer-law-and-security-review/
2EURASIP Journal on Information SecuritySpringerhttp://dblp.uni-trier.de/db/journals/ejisec/
3IET Information SecurityIEThttp://dblp.uni-trier.de/db/journals/iet-ifs/
4IMCSInformation Management & Computer SecurityEmeraldhttp://dblp.uni-trier.de/db/journals/imcs/
5IJICSInternational Journal of Information and Computer SecurityIndersciencehttp://dblp.uni-trier.de/db/journals/ijics/
6IJISPInternational Journal of Information Security and PrivacyIdea Group Inchttp://dblp.uni-trier.de/db/journals/ijisp/
7JISAJournal of Information Security and ApplicationElsevierhttps://dblp.uni-trier.de/db/journals/istr/
8SCNSecurity and Communication NetworksWileyhttp://dblp.uni-trier.de/db/journals/scn/

中国计算机学会推荐国际学术会议

(网络与信息安全)

一、A类

序号会议简称会议全称出版社网址
1CCSACM Conference on Computer and Communications SecurityACMhttp://dblp.uni-trier.de/db/conf/ccs/
2EUROCRYPTEuropean Cryptology ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/eurocrypt/
3S&PIEEE Symposium on Security and PrivacyIEEEhttp://dblp.uni-trier.de/db/conf/sp/
4CRYPTOInternational Cryptology ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/crypto/
5USENIX SecurityUsenix Security SymposiumUSENIX Associationhttp://dblp.uni-trier.de/db/conf/uss/

二、B类

序号会议简称会议全称出版社网址
1ACSACAnnual Computer Security Applications ConferenceIEEEhttp://dblp.uni-trier.de/db/conf/acsac/
2ASIACRYPTAnnual International Conference on the Theory and Application of Cryptology and Information SecuritySpringerhttp://dblp.uni-trier.de/db/conf/asiacrypt/
3ESORICSEuropean Symposium on Research in Computer SecuritySpringerhttp://dblp.uni-trier.de/db/conf/esorics/
4FSEFast Software EncryptionSpringerhttp://dblp.uni-trier.de/db/conf/fse/
5CSFWIEEE Computer Security Foundations WorkshopIEEEhttp://dblp.uni-trier.de/db/conf/csfw/
6SRDSIEEE International Symposium on Reliable Distributed SystemsIEEEhttp://dblp.uni-trier.de/db/conf/srds/
7CHESInternational Conference on Cryptographic Hardware and Embedded SystemsSpringerhttp://dblp.uni-trier.de/db/conf/ches/
8DSNInternational Conference on Dependable Systems and NetworksIEEE/IFIPhttp://dblp.uni-trier.de/db/conf/dsn/
9RAIDInternational Symposium on Recent Advances in Intrusion DetectionSpringerhttp://dblp.uni-trier.de/db/conf/raid/
10PKCInternational Workshop on Practice and Theory in Public Key CryptographySpringerhttp://dblp.uni-trier.de/db/conf/pkc/
11NDSSISOC Network and Distributed System Security SymposiumISOChttp://dblp.uni-trier.de/db/conf/ndss/
12TCCTheory of Cryptography ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/tcc/

三、C类

序号会议简称会议全称出版社网址
1WiSecACM Conference on Security and Privacy in Wireless and Mobile NetworksACMhttp://dblp.uni-trier.de/db/conf/wisec/
2SACMATACM Symposium on Access Control Models and TechnologiesACMhttp://dblp.uni-trier.de/db/conf/sacmat/
3DRMACM Workshop on Digital Rights ManagementACMhttp://dblp.uni-trier.de/db/conf/drm/
4IH&MMSecACM Workshop on Information Hiding and Multimedia SecurityACMhttp://dblp.uni-trier.de/db/conf/ih/
5ACNSApplied Cryptography and Network SecuritySpringerhttp://dblp.uni-trier.de/db/conf/acns/
6AsiaCCSAsia Conference on Computer and Communications SecurityACMhttp://dblp.uni-trier.de/db/conf/ccs/
7ACISPAustralasia Conference on Information Security and PrivacySpringerhttp://dblp.uni-trier.de/db/conf/acisp/
8CT-RSACryptographer’s Track at RSA ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/ctrsa/
9DIMVADetection of Intrusions and Malware & Vulnerability Assessmenthttp://dblp.uni-trier.de/db/conf/dimva/
10DFRWSDigital Forensic Research WorkshopElsevierhttp://dblp.uni-trier.de/db/conf/dfrws/
11FCFinancial Cryptography and Data SecuritySpringerhttp://dblp.uni-trier.de/db/conf/fc/
12TrustComIEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsIEEEhttp://dblp.uni-trier.de/db/conf/trustcom/
13SECIFIP International Information Security ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/sec/
14IFIP WG 11.9IFIP WG 11.9 International Conference on Digital ForensicsSpringer*http://www.ifip119.org/Conferences/
15ISCInformation Security ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/isw/
16ICDF2CInternational Conference on Digital Forensics & Cyber CrimeSpringerhttp://dblp.uni-trier.de/db/conf/icdf2c/
17ICICSInternational Conference on Information and Communications SecuritySpringerhttp://dblp.uni-trier.de/db/conf/icics/
18SecureCommInternational Conference on Security and Privacy in Communication NetworksACMhttp://dblp.uni-trier.de/db/conf/securecomm/
19NSPWNew Security Paradigms WorkshopACMhttp://dblp.uni-trier.de/db/conf/nspw/
20PAMPassive and Active Measurement ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/pam/
21PETSPrivacy Enhancing Technologies SymposiumSpringerhttp://dblp.uni-trier.de/db/conf/pet/
22SACSelected Areas in CryptographySpringerhttp://dblp.uni-trier.de/db/conf/sacrypt/
23SOUPSSymposium On Usable Privacy and SecurityUSENIXhttp://dblp.uni-trier.de/db/conf/soups/
24HotSecUSENIX Workshop on Hot Topics in SecurityUSENIX*http://www.usenix.org/events/
  • 6
    点赞
  • 29
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 4
    评论
评论 4
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

北下关吴中生

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值