中国计算机学会CCF推荐国际学术会议和期刊目录-网络与信息安全
来源:互联网 发布:java框架是什么 编辑:程序博客网 时间:2024/05/23 02:07
(网络与信息安全)
1
TDSC
IEEE Transactions on Dependable and Secure Computing
IEEE
http://dblp.uni-trier.de/db/journals/tdsc/
2
TIFS
IEEE Transactions on Information Forensics and Security
IEEE
http://dblp.uni-trier.de/db/journals/tifs/
3
Journal of Cryptology
Springer
http://dblp.uni-trier.de/db/journals/joc/
1
TISSEC
ACM Transactions on Information and System Security
ACM
http://dblp.uni-trier.de/db/journals/tissec/
2
Computers & Security
Elsevier
http://dblp.uni-trier.de/db/journals/compsec/
3
Designs, Codes and Cryptography
Springer
http://dblp.uni-trier.de/db/journals/dcc/
4
JCS
Journal of Computer Security
IOS Press
http://dblp.uni-trier.de/db/journals/jcs/
1
CLSR
Computer Law and Security Reports
Elsevier
http://www.journals.elsevier.com/computer
-law-and-security-review/
2
EURASIP Journal on Information Security
Springer
http://dblp.uni-trier.de/db/journals/ejisec/
3
IET Information Security
IET
http://dblp.uni-trier.de/db/journals/iet-ifs/
4
IMCS
Information Management & Computer Security
Emerald
http://dblp.uni-trier.de/db/journals/imcs/
5
ISTR
Information Security Technical Report
Elsevier
http://dblp.uni-trier.de/db/journals/istr/
6
IJISP
International Journal of Information Security and Privacy
Idea Group Inc
http://dblp.uni-trier.de/db/journals/ijisp/
7
IJICS
International Journal of Information and Computer Security
Inderscience
http://dblp.uni-trier.de/db/journals/ijics/
8
SCN
Security and Communication Networks
Wiley
http://dblp.uni-trier.de/db/journals/scn/
(网络与信息安全)
1
CCS
ACM Conference on Computer and Communications Security
ACM
http://dblp.uni-trier.de/db/conf/ccs/
2
CRYPTO
International Cryptology Conference
Springer
http://dblp.uni-trier.de/db/conf/crypto/
3
EUROCRYPT
European Cryptology Conference
Springer
http://dblp.uni-trier.de/db/conf/eurocrypt/
4
S&P
IEEE Symposium on Security and Privacy
IEEE
http://dblp.uni-trier.de/db/conf/sp/
5
USENIX Security
Usenix Security Symposium
USENIX Association
http://dblp.uni-trier.de/db/conf/uss/
1
ACSAC
Annual Computer Security Applications
Conference
IEEE
http://dblp.uni-trier.de/db/conf/acsac/
2
ASIACRYPT
Annual International Conference on the
Theory and Application of Cryptology
and Information Security
Springer
http://dblp.uni-trier.de/db/conf/asiacrypt/
3
ESORICS
European Symposium on Research in
Computer Security
Springer
http://dblp.uni-trier.de/db/conf/esorics/
4
FSE
Fast Software Encryption
Springer
http://dblp.uni-trier.de/db/conf/fse/
5
NDSS
ISOC Network and Distributed System
Security Symposium
ISOC
http://dblp.uni-trier.de/db/conf/ndss/
6
CSFW
IEEE Computer Security Foundations
Workshop
IEEE
http://dblp.uni-trier.de/db/conf/csfw/
7
RAID
International Symposium on Recent
Advances in Intrusion Detection
Springer
http://dblp.uni-trier.de/db/conf/raid/
8
PKC
International Workshop on Practice and
Theory in Public Key Cryptography
Springer
http://dblp.uni-trier.de/db/conf/pkc/
9
DSN
The International Conference on Dependable Systems and Networks
IEEE/IFIP
http://dblp.uni-trier.de/db/conf/dsn/
10
TCC
Theory of Cryptography Conference
Springer
http://dblp.uni-trier.de/db/conf/tcc/
11
SRDS
IEEE International Symposium on Reliable
Distributed Systems
IEEE
http://dblp.uni-trier.de/db/conf/srds/
12
CHES
Workshop on Cryptographic Hardware and
Embedded Systems
Springer
http://dblp.uni-trier.de/db/conf/ches/
1
WiSec
ACM Conference on Security and Privacy in
Wireless and Mobile Networks
ACM
http://dblp.uni-trier.de/db/conf/wisec/
2
ACM MM&SEC
ACM Multimedia and Security Workshop
ACM
http://dblp.uni-trier.de/db/conf/ih/
3
SACMAT
ACM Symposium on Access Control
Models and Technologies
ACM
http://dblp.uni-trier.de/db/conf/sacmat/
4
ASIACCS
ACM Symposium on Information, Computer and
Communications Security
ACM
http://dblp.uni-trier.de/db/conf/ccs/
5
DRM
ACM Workshop on Digital Rights
Management
ACM
http://dblp.uni-trier.de/db/conf/drm/
6
ACNS
Applied Cryptography and Network Security
Springer
http://dblp.uni-trier.de/db/conf/acns/
7
ACISP
Australasia Conference on Information
Security and Privacy
Springer
http://dblp.uni-trier.de/db/conf/acisp/
8
DFRWS
Digital Forensic Research Workshop
Elsevier
http://dblp.uni-trier.de/db/conf/dfrws/
9
FC
Financial Cryptography and Data Security
Springer
http://dblp.uni-trier.de/db/conf/fc/
10
DIMVA
Detection of Intrusions and Malware &
Vulnerability Assessment
SIDAR、GI、Springer
http://dblp.uni-trier.de/db/conf/dimva/
11
SEC
IFIP International Information
Security Conference
Springer
http://dblp.uni-trier.de/db/conf/sec/
12
IFIP WG 11.9
IFIP WG 11.9 International Conference
on Digital Forensics
Springer
http://www.ifip119.org/Conferences/
13
ISC
Information Security Conference
Springer
http://dblp.uni-trier.de/db/conf/isw/
14
ICICS
International Conference on Information
and Communications Security
Springer
http://dblp.uni-trier.de/db/conf/icics/
15
SecureComm
International Conference on Security and
Privacy in Communication Networks
ACM
http://dblp.uni-trier.de/db/conf/securecomm/
16
NSPW
New Security Paradigms Workshop
ACM
http://dblp.uni-trier.de/db/conf/nspw/
17
CT-RSA
RSA Conference, Cryptographers' Track
Springer
http://dblp.uni-trier.de/db/conf/ctrsa/
18
SOUPS
Symposium On Usable Privacy and Security
ACM
http://dblp.uni-trier.de/db/conf/soups/
19
HotSec
USENIX Workshop on Hot Topics in
Security
USENIX
http://www.usenix.org/events/
20
SAC
Selected Areas in Cryptography
Springer
http://dblp.uni-trier.de/db/conf/sacrypt/
21
TrustCom
IEEE International Conference on Trust,
Security and Privacy in Computing and
Communications
IEEE
http://dblp.uni-trier.de/db/conf/trustcom/
22
PAM
Passive and Active Measurement
Conference
Springer
http://dblp.uni-trier.de/db/conf/pam/
23
PETS
Privacy Enhancing Technologies Symposium
Springer
http://dblp.uni-trier.de/db/conf/pet/
24
International Conference on Digital
Forensics & Cyber Crime
Springer
http://dblp.uni-trier.de/db/conf/icdf2c/
点击下载: 网络与信息安全.pdffrom: http://www.ccf.org.cn/sites/ccf/biaodan.jsp?contentId=2903940690850
- 中国计算机学会CCF推荐国际学术会议和期刊目录-网络与信息安全
- 中国计算机学会推荐国际学术会议和期刊目录——网络与信息安全
- 中国计算机学会CCF推荐国际学术会议和期刊目录-人工智能
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机网络
- 中国计算机学会CCF推荐国际学术会议和期刊目录
- 中国计算机学会CCF推荐国际学术会议和期刊目录-人工智能
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机网络
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机图形学与多媒体
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机体系结构/并行与分布计算/存储系统
- 中国计算机学会CCF推荐国际学术会议和期刊目录-人机交互与普适计算
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机图形学与多媒体
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机体系结构/并行与分布计算/存储系统
- 中国计算机学会CCF推荐国际学术会议和期刊目录-人机交互与普适计算
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机体系结构/并行与分布计算/存储系统
- CCF推荐国际学术会议和期刊目录-网络与信息安全
- 中国计算机学会CCF推荐国际学术会议和期刊目录-数据库/数据挖掘/内容检索
- 中国计算机学会CCF推荐国际学术会议和期刊目录-软件工程/系统软件/程序设计语言
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机科学理论
- java不用api实现单链表反转(二)
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机网络
- 【ONTAK2010】【BZOJ3551】Peaks加强版
- C语言学习笔记8-函数
- POJ 2135_Farm Tour
- 中国计算机学会CCF推荐国际学术会议和期刊目录-网络与信息安全
- mysql 更改root账户密码 - mysql-5.7.11-osx10.10
- 解决System进程占用80端口
- Android 图片缓存之内存缓存技术LruCache
- Exynos4412裸机开发 —— A/D转换器
- 中国计算机学会CCF推荐国际学术会议和期刊目录-软件工程/系统软件/程序设计语言
- Grub2引导Grub4dos菜单写法
- DFS算法初探
- 中国计算机学会CCF推荐国际学术会议和期刊目录-计算机科学理论