首页 > 代码库 > 【汇总】国际会议 信息安全相关 -- 2014-9更新
【汇总】国际会议 信息安全相关 -- 2014-9更新
想要了解最新的学术研究动态,时刻track顶级的会议,顶级的workshop,顶级的researcher都是必要的。
添加了自己需要的会议最新日期,以及最新结束会议。并收集它们的论文集。
下面就是参考别人的表格,自己汇总的一个表格,根据会议的CIF( Conference Impact Factor )进行排列,不一定权威。将不定期更新
RK | Conference | Lasted updated | ||
R1 | 1、IEEE S&P IEEE Symposium on Security and Privacy http://www.ieee-security.org/TC/SP-Index.html | 2015 5.18-5.20 http://www.ieee-security.org/TC/SP2015/index.html | ||
2、Usenix Sec Usenix Security Symposium https://www.usenix.org/conferences/byname/108 | 2015 5.18-5.20 https://www.usenix.org/conference/hotos15 | |||
3、ACM CCS ACM Conference on Computer and Communications Security http://www.sigsac.org/ccs.html | 2014 11.3-11.7 http://www.sigsac.org/ccs/CCS2014/ | |||
4、Crypto International Cryptology Conference http://www.iacr.org/conferences/ | 2014 8.17-21【done】 http://www.iacr.org/conferences/crypto2014/ 论文集下载 | |||
5、Eurocrypt European Cryptology Conference http://www.iacr.org/conferences/ | 2015 4.26-30 Eurocrypt 2015 | |||
6、NDSS ISOC Network and Distributed System Security Symposium http://www.internetsociety.org/events/ndss-symposium | 2015 2.8-11 NDSS 2015 | |||
R2 | 7、ESORICS European Symposium on Research in Computer Security http://homepages.laas.fr/esorics/ | 2014 9.7-11【done】 http://esorics2014.pwr.wroc.pl/ 论文集下载 | ||
8、RAID International Symposium on Recent Advances in Intrusion Detection http://www.raid-symposium.org/ | 2014 9.17-19【done】 http://www.raid2014.eu/ 论文集下载 | |||
9、ACSAC Annual Computer Security Applications Conference http://www.acsac.org/ | 2014 11.8-12 http://www.acsac.org/ | |||
10、DSN The International Conference on Dependable Systems and Networks http://www.ft.unicamp.br/dsn2015/ | 2015 6.22-25 http://www.ft.unicamp.br/dsn2015/ | |||
11、CSF(CSFW) IEEE Computer Security Foundations Symposium (Computer Security Foundations Workshop) http://www.ieee-security.org/CSFWweb/ | 2014 7.19-22【done】 http://csf2014.di.univr.it/index | |||
12、TCC Theory of Cryptography Conference http://www.iacr.org/workshops/tcc/ | 2014 2.24-26【done】 http://www.iacr.org/workshops/tcc2014/ | |||
13、Asiacrypt International Conference on the Theory and Application of Cryptology and Information Security http://www.iacr.org/conferences/ | 2014 12.7-11 http://des.cse.nsysu.edu.tw/asiacrypt2014/ | |||
14、IMC Internet Measurement Conference http://www.sigcomm.org/events/imc-conference | 2014 11.5-7 http://www.sigcomm.org/events/imc-conference | |||
R3 | 15、SecureComm IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks http://securecomm.org/2014/show/home | 2014 9.24-26【done】 http://securecomm.org/2014/show/home | ||
16、DIMVA GISIG SIDAR Conference on Detection of Intrusions and Malware and VulnerabilityAssessment http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/ | 2014 7.10-11【done】 http://dimva2014.isg.rhul.ac.uk/ | |||
17、AsiaCCS ACM Symposium on Information, Computer and Communications Security http://dsns.csie.nctu.edu.tw/asiaccs/ | 2015 4.14-17 http://icsd.i2r.a-star.edu.sg/asiaccs15/ | |||
18、ACNS International Conference on Applied Cryptography and Network Security http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/ | 2015 6.2-5 http://acns2015.cs.columbia.edu/ | |||
19、FC International Conference on Financial Cryptography and Data Security http://fc15.ifca.ai/ | 2015 1.26-30 http://fc15.ifca.ai/ | |||
20、SAC ACM Symposium on Applied Computing http://www.acm.org/conferences/sac/ | 2015 4.13-17 http://www.acm.org/conferences/sac/sac2015/ | |||
21、ACISP Australasia Conference on Information Security and Privacy | 2014 7.7-9【done】 https://ssl.informatics.uow.edu.au/acisp2014/ | |||
22、ICICS International Conference on Information and Communications Security | 2014 12.16-17 http://www.cs.hku.hk/icics2014/ | |||
23、ICISC InternationalConference on Information Security and Cryptology http://www.icisc.org/icisc14/asp/index.html | 2014 12.3-5 http://www.icisc.org/icisc14/asp/index.html | |||
24、SACMAT ACM Symposium on Access Control Models and Technologies http://www.sacmat.org/2015/index.php | 2015 6.1-3 http://www.sacmat.org/2015/index.php | |||
25、WiSec ACM Conference on Wireless Network Security and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks) http://www.sigsac.org/wisec/WiSec2014/ | 2014 7.23-25【done】 http://www.sigsac.org/wisec/WiSec2014/ | |||
26、SOUPS Symposium On Usable Privacy and Security http://cups.cs.cmu.edu/soups/2014/ | 2015 7.22-24 http://cups.cs.cmu.edu/soups/2014/ | |||
27、MALWARE International Conference on Malicious and Unwanted Software http://www.malwareconference.org/ | 2014 10.28-30 http://www.malwareconference.org/ | |||
28、CODASPY ACM Conference on Data and Application Security and Privacy http://codaspy.utsa.edu/cfp.html | 2015 3.2-4 http://codaspy.utsa.edu/cfp.html |
Workshop
| 1、CHES Workshop on Cryptographic Hardware and Embedded Systems |
http://www.chesworkshop.org/ches2014/start.php | |
| 2、LEET USENIX Workshop on Large-scale Exploits and Emergent Threats and WORM (ACM Workshop on Recurring/Rapid Malcode) |
|
CIF Reference:
http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking.html
Reference Ranking:
http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
【汇总】国际会议 信息安全相关 -- 2014-9更新