想要了解最新的学术研究动态,时刻track顶级的会议,顶级的workshop,顶级的researcher都是必要的。
添加了自己需要的会议最新日期,以及最新结束会议。并收集它们的论文集。
下面就是参考别人的表格,自己汇总的一个表格,根据会议的CIF( Conference Impact Factor )进行排列,不一定权威。将不定期更新
RK |
Conference |
Lasted updated |
||
R1 |
1、IEEE S&P IEEE Symposium on Security and Privacy http://www.ieee-security.org/TC/SP-Index.html |
|
2015 5.18-5.20 http://www.ieee-security.org/TC/SP2015/index.html |
|
2、Usenix Sec Usenix Security Symposium https://www.usenix.org/conferences/byname/108 |
2015 5.18-5.20 https://www.usenix.org/conference/hotos15 |
|||
3、ACM CCS ACM Conference on Computer and Communications Security http://www.sigsac.org/ccs.html |
2014 11.3-11.7 http://www.sigsac.org/ccs/CCS2014/ |
|||
4、Crypto International Cryptology Conference http://www.iacr.org/conferences/ |
2014 8.17-21【done】 http://www.iacr.org/conferences/crypto2014/ 论文集下载 |
|||
5、Eurocrypt European Cryptology Conference http://www.iacr.org/conferences/ |
2015 4.26-30 Eurocrypt 2015 |
|||
6、NDSS ISOC Network and Distributed System Security Symposium http://www.internetsociety.org/events/ndss-symposium |
2015 2.8-11 NDSS 2015 |
|||
R2 |
7、ESORICS European Symposium on Research in Computer Security http://homepages.laas.fr/esorics/ |
2014 9.7-11【done】 http://esorics2014.pwr.wroc.pl/ 论文集下载 |
||
8、RAID International Symposium on Recent Advances in Intrusion Detection http://www.raid-symposium.org/ |
2014 9.17-19【done】 http://www.raid2014.eu/ 论文集下载 |
|||
9、ACSAC Annual Computer Security Applications Conference http://www.acsac.org/ |
2014 11.8-12 http://www.acsac.org/ |
|||
10、DSN The International Conference on Dependable Systems and Networks http://www.ft.unicamp.br/dsn2015/ |
2015 6.22-25 http://www.ft.unicamp.br/dsn2015/ |
|||
11、CSF(CSFW) IEEE Computer Security Foundations Symposium (Computer Security Foundations Workshop) http://www.ieee-security.org/CSFWweb/ |
2014 7.19-22【done】 http://csf2014.di.univr.it/index |
|||
12、TCC Theory of Cryptography Conference http://www.iacr.org/workshops/tcc/ |
2014 2.24-26【done】 http://www.iacr.org/workshops/tcc2014/ |
|||
13、Asiacrypt International Conference on the Theory and Application of Cryptology and Information Security http://www.iacr.org/conferences/ |
|
2014 12.7-11 http://des.cse.nsysu.edu.tw/asiacrypt2014/ |
||
14、IMC Internet Measurement Conference http://www.sigcomm.org/events/imc-conference |
|
2014 11.5-7 http://www.sigcomm.org/events/imc-conference |
||
R3 |
15、SecureComm IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks http://securecomm.org/2014/show/home |
2014 9.24-26【done】 http://securecomm.org/2014/show/home |
||
16、DIMVA GISIG SIDAR Conference on Detection of Intrusions and Malware and VulnerabilityAssessment http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/dimva/ |
2014 7.10-11【done】 http://dimva2014.isg.rhul.ac.uk/ |
|||
17、AsiaCCS ACM Symposium on Information, Computer and Communications Security http://dsns.csie.nctu.edu.tw/asiaccs/ |
2015 4.14-17 http://icsd.i2r.a-star.edu.sg/asiaccs15/ |
|||
18、ACNS International Conference on Applied Cryptography and Network Security http://icsd.i2r.a-star.edu.sg/staff/jianying/acns_home/ |
2015 6.2-5 http://acns2015.cs.columbia.edu/ |
|||
19、FC International Conference on Financial Cryptography and Data Security http://fc15.ifca.ai/ |
2015 1.26-30 http://fc15.ifca.ai/
|
|
||
20、SAC ACM Symposium on Applied Computing http://www.acm.org/conferences/sac/ |
2015 4.13-17 http://www.acm.org/conferences/sac/sac2015/ |
|||
21、ACISP Australasia Conference on Information Security and Privacy |
2014 7.7-9【done】 https://ssl.informatics.uow.edu.au/acisp2014/ |
|||
22、ICICS International Conference on Information and Communications Security |
2014 12.16-17 http://www.cs.hku.hk/icics2014/ |
|||
23、ICISC InternationalConference on Information Security and Cryptology http://www.icisc.org/icisc14/asp/index.html |
2014 12.3-5 http://www.icisc.org/icisc14/asp/index.html |
|||
24、SACMAT ACM Symposium on Access Control Models and Technologies http://www.sacmat.org/2015/index.php |
2015 6.1-3 http://www.sacmat.org/2015/index.php |
|||
25、WiSec ACM Conference on Wireless Network Security and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks) http://www.sigsac.org/wisec/WiSec2014/ |
|
2014 7.23-25【done】 http://www.sigsac.org/wisec/WiSec2014/ |
||
26、SOUPS Symposium On Usable Privacy and Security http://cups.cs.cmu.edu/soups/2014/ |
2015 7.22-24 http://cups.cs.cmu.edu/soups/2014/ |
|||
27、MALWARE International Conference on Malicious and Unwanted Software http://www.malwareconference.org/ |
|
2014 10.28-30 http://www.malwareconference.org/ |
||
28、CODASPY ACM Conference on Data and Application Security and Privacy http://codaspy.utsa.edu/cfp.html |
2015 3.2-4 http://codaspy.utsa.edu/cfp.html |
Workshop
|
1、CHES Workshop on Cryptographic Hardware and Embedded Systems |
http://www.chesworkshop.org/ches2014/start.php |
|
|
2、LEET USENIX Workshop on Large-scale Exploits and Emergent Threats and WORM (ACM Workshop on Recurring/Rapid Malcode) |
|
|
CIF Reference:
http://icsd.i2r.a-star.edu.sg/staff/jianying/conference-ranking.html
Reference Ranking:
http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm