当前位置: 首页 > news >正文

【论文写作】--网络与信息安全顶刊顶会

目录

1.中国计算机学会

2.DBLP

3.网络与信息安全顶刊

3.1.A类

3.2.B类

3.3.C类

4.网络与信息安全顶会

4.1.A类

4.2.B类

4.3.C类


1.中国计算机学会

中国计算机学会(China Computer Federation,简称CCF)是中国计算机及相关领域最权威、最具影响力的学术组织和专业团体之一。

官网:https://www.ccf.org.cn

2.DBLP

DBLP​​ 是一个专注于​​计算机科学​​领域的​​在线书目数据库​​(可以理解为专业的论文索引网站)。它的核心使命是索引来自期刊、会议、研讨会等出版的学术论文,并将其与作者信息精确关联。它被誉为计算机科学的“数字书目图书馆”。(德国的)

德国特里尔大学计算机科学系维护的计算机科学文献库

D​​ata​​b​​ase systems and ​​L​​ogic ​​P​​rogramming” 

官网:https://dblp.org/

3.网络与信息安全顶刊

网络空间安全顶刊顶会

CCF认证的

3.1.A类

序号刊物名称刊物全称出版社地址
1TDSCIEEE Transactions on Dependable and Secure ComputingIEEEhttp://dblp.uni-trier.de/db/journals/tdsc/
2TIFSIEEE Transactions on Information Forensics and SecurityIEEEhttp://dblp.uni-trier.de/db/journals/tifs/
3Journal of CryptologyJournal of CryptologySpringerhttp://dblp.uni-trier.de/db/journals/joc/

3.2.B类

序号刊物名称刊物全称出版社地址
1TOPSACM Transactions on Privacy and SecurityACMhttps://dblp.org/db/journals/tissec/index.html
2Computers & SecurityComputers & SecurityElsevierhttp://dblp.uni-trier.de/db/journals/compsec/
3Designs, Codes and CryptographyDesigns, Codes and CryptographySpringerhttp://dblp.uni-trier.de/db/journals/dcc/
4JCSJournal of Computer SecurityIOS Presshttp://dblp.uni-trier.de/db/journals/jcs/

3.3.C类

序号刊物名称刊物全称出版社地址
1CLSRComputer Law & Security ReviewElsevierhttps://dblp.org/db/journals/clsr/index.html
2EURASIP Journal on Information SecurityEURASIP Journal on Information SecuritySpringerhttp://dblp.uni-trier.de/db/journals/ejisec/
3IET Information SecurityIET Information SecurityIEThttp://dblp.uni-trier.de/db/journals/iet-ifs/
4IMCSInformation and Computer SecurityEmeraldhttp://dblp.uni-trier.de/db/journals/imcs/
5IJICSInternational Journal of Information and Computer SecurityIndersciencehttp://dblp.uni-trier.de/db/journals/ijics/
6IJISPInternational Journal of Information Security and PrivacyIGI Globalhttp://dblp.uni-trier.de/db/journals/ijisp/
7JISAJournal of Information Security and ApplicationsElsevierhttp://dblp.uni-trier.de/db/journals/istr/
8SCNSecurity and Communication NetworksWileyhttp://dblp.uni-trier.de/db/journals/scn/
9CybersecurityCybersecuritySpringerhttps://dblp.uni-trier.de/db/journals/cybersec/index.html

4.网络与信息安全顶会

4.1.A类

序号刊物名称刊物全称出版社地址
1CCSACM Conference on Computer and Communications SecurityACMhttp://dblp.uni-trier.de/db/conf/ccs/
2EUROCRYPTInternational Conference on the Theory and Applications of Cryptographic TechniquesSpringerhttp://dblp.uni-trier.de/db/conf/eurocrypt/
3S&PIEEE Symposium on Security and PrivacyIEEEhttp://dblp.uni-trier.de/db/conf/sp/
4CRYPTOInternational Cryptology ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/crypto/
5USENIX SecurityUSENIX Security SymposiumUSENIX Associationhttp://dblp.uni-trier.de/db/conf/uss/
6NDSSNetwork and Distributed System Security SymposiumISOChttp://dblp.uni-trier.de/db/conf/ndss/

4.2.B类

序号刊物名称刊物全称出版社地址
1ACSACAnnual Computer Security Applications ConferenceIEEEhttp://dblp.uni-trier.de/db/conf/acsac/
2ASIACRYPTAnnual International Conference on the Theory and Application of Cryptology and Information SecuritySpringerhttp://dblp.uni-trier.de/db/conf/asiacrypt/
3ESORICSEuropean Symposium on Research in Computer SecuritySpringerhttp://dblp.uni-trier.de/db/conf/esorics/
4FSEFast Software EncryptionSpringerhttp://dblp.uni-trier.de/db/conf/fse/
5CSFWIEEE Computer Security Foundations WorkshopIEEEhttp://dblp.uni-trier.de/db/conf/csfw/
6SRDSIEEE International Symposium on Reliable Distributed SystemsIEEEhttp://dblp.uni-trier.de/db/conf/srds/
7CHESInternational Conference on Cryptographic Hardware and Embedded SystemsSpringerhttp://dblp.uni-trier.de/db/conf/ches/
8DSNInternational Conference on Dependable Systems and NetworksIEEE/IFIPhttp://dblp.uni-trier.de/db/conf/dsn/
9RAIDInternational Symposium on Recent Advances in Intrusion DetectionSpringerhttp://dblp.uni-trier.de/db/conf/raid/
10PKCInternational Workshop on Practice and Theory in Public Key CryptographySpringerhttp://dblp.uni-trier.de/db/conf/pkc/
11TCCTheory of Cryptography ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/tcc/

4.3.C类

序号刊物名称刊物全称出版社地址
1WiSecACM Conference on Security and Privacy in Wireless and Mobile NetworksACMhttp://dblp.uni-trier.de/db/conf/wisec/
2SACMATACM Symposium on Access Control Models and TechnologiesACMhttp://dblp.uni-trier.de/db/conf/sacmat/
3DRMACM Workshop on Digital Rights ManagementACMhttp://dblp.uni-trier.de/db/conf/drm/
4IH&MMSecACM Workshop on Information Hiding and Multimedia SecurityACMhttp://dblp.uni-trier.de/db/conf/ih/
5ACNSInternational Conference on Applied Cryptography and Network SecuritySpringerhttp://dblp.uni-trier.de/db/conf/acns/
6AsiaCCSACM Asia Conference on Computer and Communications SecurityACMhttp://dblp.uni-trier.de/db/conf/ccs/
7ACISPAustralasian Conference on Information Security and PrivacySpringerhttp://dblp.uni-trier.de/db/conf/acisp/
8CT-RSAThe Cryptographer's Track at RSA ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/ctrsa/
9DIMVAConference on Detection of Intrusions and Malware & Vulnerability AssessmentSpringerhttp://dblp.uni-trier.de/db/conf/dimva/
10DFRWSDigital Forensic Research WorkshopElsevierhttp://dblp.uni-trier.de/db/conf/dfrws/
11FCFinancial Cryptography and Data SecuritySpringerhttp://dblp.uni-trier.de/db/conf/fc/
12TrustComIEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsIEEEhttp://dblp.uni-trier.de/db/conf/trustcom/
13SECIFIP International Information Security ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/sec/
14IFIP WG 11.9IFIP Working Group 11.9 International Conference on Digital ForensicsSpringerhttps://dblp.org/db/conf/ifip11-9/index.html
15ISCInformation Security ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/isw/
16ICDF2CInternational Conference on Digital Forensics & Cyber CrimeSpringerhttp://dblp.uni-trier.de/db/conf/icdf2c/
17ICICSInternational Conference on Information and Communications SecuritySpringerhttp://dblp.uni-trier.de/db/conf/icics/
18SecureCommInternational Conference on Security and Privacy in Communication NetworksACMhttp://dblp.uni-trier.de/db/conf/securecomm/
19NSPWNew Security Paradigms WorkshopACMhttp://dblp.uni-trier.de/db/conf/nspw/
20PAMPassive and Active Measurement ConferenceSpringerhttp://dblp.uni-trier.de/db/conf/pam/
21PETSPrivacy Enhancing Technologies SymposiumSpringerhttp://dblp.uni-trier.de/db/conf/pet/
22SACSelected Areas in CryptographySpringerhttp://dblp.uni-trier.de/db/conf/sacrypt/
23SOUPSSymposium On Usable Privacy and SecurityACMhttp://dblp.uni-trier.de/db/conf/soups/
24HotSecUSENIX Workshop on Hot Topics in SecurityUSENIXhttp://www.usenix.org/events/(注:建议访问 https://www.usenix.org/conferences/byname/hotsec 获取最新)
25EuroS&PIEEE European Symposium on Security and PrivacyIEEEhttps://dblp.org/db/conf/eurosp/index.html
26InscryptInternational Conference on Information Security and CryptologySpringerhttps://dblp.org/db/conf/cisc/index.html

文章转载自:

http://5R0lhEOB.bzcjx.cn
http://xf2waRX2.bzcjx.cn
http://iByHx2OK.bzcjx.cn
http://JYLk9hpo.bzcjx.cn
http://SQPcI5b4.bzcjx.cn
http://qsPi41SB.bzcjx.cn
http://tWXuzUJN.bzcjx.cn
http://FCWWkgSb.bzcjx.cn
http://lJ1TUI5W.bzcjx.cn
http://LBvEzuyM.bzcjx.cn
http://cOp0Mo16.bzcjx.cn
http://MyyqzuP1.bzcjx.cn
http://gQLTWLFh.bzcjx.cn
http://C0YZVyfs.bzcjx.cn
http://2ZCnckjB.bzcjx.cn
http://W0Ve5sCr.bzcjx.cn
http://MK7gNo6b.bzcjx.cn
http://2bLiHH0J.bzcjx.cn
http://I1ymdY0s.bzcjx.cn
http://hwpNVkhF.bzcjx.cn
http://Bd6ZoTEe.bzcjx.cn
http://4jbcWH0i.bzcjx.cn
http://r7gjBAnO.bzcjx.cn
http://rt7Mft33.bzcjx.cn
http://hsg6vhX3.bzcjx.cn
http://hR7fAtb8.bzcjx.cn
http://59UNwPPJ.bzcjx.cn
http://uEYtbumy.bzcjx.cn
http://9cPfnZNR.bzcjx.cn
http://OQ30Sd0L.bzcjx.cn
http://www.dtcms.com/a/375851.html

相关文章:

  • 【人工智能99问】如何基于QWen3进行LoRA微调?(38/99)
  • JAVA Predicate
  • 自动驾驶中的传感器技术41——Radar(2)
  • Netty HandlerContext 和 Pipeline
  • Stuns in Singapore!中新赛克盛大亮相ISS World Asia 2025
  • 开始 ComfyUI 的 AI 绘图之旅-LoRA(五)
  • 字符函数和字符串函数 last part
  • win安装多个mysql,免安装mysql
  • 开源项目_强化学习股票预测
  • Shell 脚本基础:从语法到实战全解析
  • Nginx如何部署HTTP/3
  • 解一元三次方程
  • A股大盘数据-20250909分析
  • 05-Redis 命令行客户端(redis-cli)实操指南:从连接到返回值解析
  • shell函数+数组+运算+符号+交互
  • 群晖Lucky套件高级玩法-——更新证书同步更新群晖自带证书
  • 照明控制设备工程量计算 -图形识别超方便
  • Matlab通过FFT快速傅里叶变换提取频率
  • iis 高可用
  • 有趣的数学 贝塞尔曲线和毕加索
  • 基于STM32的智能宠物小屋设计
  • STM32之RS485与ModBus详解
  • DCDC输出
  • GitHub 项目提交完整流程(含常见问题与解决办法)
  • Day39 SQLite数据库操作与文本数据导入
  • python常用命令
  • 广东省省考备考(第九十五天9.9)——言语、资料分析、判断推理(强化训练)
  • MySQL问题8
  • 【AI】Jupyterlab中关于TensorFlow版本问题
  • Java 运行时异常与编译时异常以及异常是否会对数据库造成影响?