分享我的一些关于获取计算机类会议信息的渠道,帮助大家能够快速、全面的了解信息安全领域內的一些顶级会议、水会等等。
一、会议信息聚集网站列表
| 网站名称 | URL | 说明 | 综合评级 |
|---|---|---|---|
| 中国学术会议在线 | http://www.meeting.edu.cn/ | 教育部主办的网站,大杂烩,各个学科都有,不太适合快速提取信息 | ★★★ |
| WikiCFP | http://www.wikicfp.com | 国外的一个收集CFP的Wiki,信息更新频率很高,信息量太大 | ★★★★ |
| SemreX CFP | http://grid.hust.edu.cn:8080/call/index.jsp | 华中科技大学“服务计算技术与系统教育部重点实验室”开发的一个会议信息聚集网站,支持搜索、按会议时间、地点、主题的排序和过滤功能,重点推荐 | ★★★★★ |
二、信息安全领域的顶级会议
以下表格摘自:http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm
| Rank 1 |
S&P (Oakland)
|
IEEE Symposium on Security and Privacy |
| CCS | ACM Conference on Computer and Communications Security | |
| Crypto | International Cryptology Conference | |
| Eurocrypt | European Cryptology Conference | |
| Usenix Security Symposium | ||
| NDSS | ISOC Network and Distributed System Security Symposium | |
| Rank 2 | ESORICS | European Symposium on Research in Computer Security |
| RAID | International Symposium on Recent Advances in Intrusion Detection | |
| ACSAC | Annual Computer Security Applications Conference | |
| DSN | The International Conference on Dependable Systems and Networks | |
| CSF (CSFW) |
IEEE Computer Security Foundations Symposium. Supersedes CSFW (Computer Security Foundations Workshop) |
|
| TCC | Theory of Cryptography Conference | |
| Asiacrypt | International Conference on the Theory and Application of Cryptology and Information Security | |
| IMC | Internet Measurement Conference | |
| Rank 3 | SecureComm | IEEE Communications Society/CreateNet Internation Conference on Security and Privacy for Emerging Areas in Communication Networks |
| DIMVA | GI SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment | |
| AsiaCCS | ACM Symposium on Information, Computer and Communications Security | |
| ACNS | International Conference on Applied Cryptography and Network Security | |
| FC | International Conference on Financial Cryptography and Data Security | |
| SAC | ACM Symposium on Applied Computing | |
| ACISP | Australasia Conference on Information Security and Privacy | |
| ICICS | International Conference on Information and Communications Security | |
| ISC | Information Security Conference | |
| ICISC | International Conference on Information Security and Cryptology | |
| SACMAT | ACM Symposium on Access Control Models and Technologies | |
| CT-RSA | RSA Conference, Cryptographers’ Track | |
| SEC | IFIP International Information Security Conference | |
|
WiSec (WiSe, SASN) |
ACM Conference on Wireless Network Security Supersedes WiSe (ACM Workshop on Wireless Security) and SASN (ACM Workshop on Security of Ad-Hoc and Sensor Networks) |
|
| SOUPS | Symposium On Usable Privacy and Security | |
| IFIP WG 11.9 | IFIP WG 11.9 International Conference on Digital Forensics | |
| — Workshops below — | ||
| DFRWS | Digital Forensic Research Workshop | |
| FSE | Fast Software Encryption workshop | |
| PKC | International Workshop on Public-Key Cryptography | |
| NSPW | New Security Paradigms Workshop | |
| IH | Workshop on Information Hiding | |
| WSPEC | Workshop on Security and Privacy in E-commerce | |
| DRM | ACM Workshop on Digital Rights Management | |
| IWIA | IEEE International Information Assurance Workshop | |
| IAW | IEEE SMC Information Assurance Workshop “The West Point Workshop” | |
| CHES | Workshop on Cryptographic Hardware and Embedded Systems | |
| SRUTI | USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet | |
| HotSec | USENIX Workshop on Hot Topics in Security | |
|
LEET (HotBots,WORM) |
USENIX Workshop on Large-scale Exploits and Emergent Threats Supersedes HotBots (USENIX Workshop on Hot Topics in Understanding Botnets) and WORM (ACM Workshop on Recurring/Rapid Malcode) |
|
| Others (not ranked) | ISPEC | Information Security Practice and Experience Conference |