Rank1 | S&P(Oakland) | IEEE Symposium on Security and Privacy |
CCS | ACM Conference on Computer and Communications Security | |
Crypto | InternationalCryptology Conference | |
Eurocrypt | European CryptologyConference | |
Usenix Security Symposium | ||
NDSS | ISOC Network andDistributed System Security Symposium | |
Rank2 | ESORICS | European Symposium on Research in Computer Security |
RAID | InternationalSymposium on Recent Advances in Intrusion Detection | |
ACSAC | Annual Computer Security ApplicationsConference | |
DSN | TheInternational Conference on Dependable Systems and Networks | |
CSF(CSFW) | IEEE ComputerSecurity Foundations Symposium. Supersedes CSFW(Computer Security Foundations Workshop) | |
TCC | Theory ofCryptography Conference | |
Asiacrypt | InternationalConference on the Theory and Application of Cryptology and InformationSecurity | |
IMC | InternetMeasurement Conference | |
Rank3 | SecureComm | IEEECommunications Society/CreateNet Internation Conference on Security andPrivacy for Emerging Areas in Communication Networks |
DIMVA | GI SIG SIDARConference on Detection of Intrusions and Malware and VulnerabilityAssessment | |
AsiaCCS | ACM Symposium onInformation, Computer and Communications Security | |
ACNS | InternationalConference on Applied Cryptography and Network Security | |
FC | InternationalConference on Financial Cryptography and Data Security | |
SAC | ACM Symposium onApplied Computing | |
ACISP | Australasia Conference on Information Security and Privacy | |
ICICS | InternationalConference on Information and Communications Security | |
ISC | InformationSecurity Conference | |
ICISC | InternationalConference on Information Security and Cryptology | |
SACMAT | ACM Symposium onAccess Control Models and Technologies | |
CT-RSA | RSA Conference,Cryptographers' Track | |
SEC | IFIPInternational Information Security Conference | |
WiSec (WiSe, SASN) | ACM Conferenceon Wireless Network Security Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACMWorkshop on Security of Ad-Hoc and Sensor Networks) | |
SOUPS | Symposium On Usable Privacy and Security | |
IFIP WG 11.9 | IFIP WG 11.9 International Conference on DigitalForensics | |
--Workshops below -- | ||
DFRWS | Digital Forensic Research Workshop | |
FSE | Fast SoftwareEncryption workshop | |
PKC | InternationalWorkshop on Public-Key Cryptography | |
NSPW | New SecurityParadigms Workshop | |
IH | Workshop on Information Hiding | |
WSPEC | Workshop on Security and Privacy in E-commerce | |
DRM | ACM Workshop onDigital Rights Management | |
IWIA | IEEEInternational Information Assurance Workshop | |
IAW | IEEE SMCInformation Assurance Workshop "The West Point Workshop" | |
CHES | Workshop onCryptographic Hardware and Embedded Systems | |
SRUTI | USENIX Workshopon Steps to Reducing Unwanted Traffic on the Internet | |
HotSec | USENIX Workshopon Hot Topics in Security | |
LEET (HotBots,WORM) | USENIX Workshopon Large-scale Exploits and Emergent Threats Supersedes HotBots (USENIX Workshop on Hot Topics in UnderstandingBotnets) and WORM (ACM Workshop on Recurring/Rapid Malcode) | |
Others(not ranked) | ISPEC | InformationSecurity Practice and Experience Conference |
欢迎光临 寄托家园留学论坛 (https://bbs.gter.net/) | Powered by Discuz! X2 |