{"id":974,"date":"2023-11-19T00:43:14","date_gmt":"2023-11-18T16:43:14","guid":{"rendered":"http:\/\/note.systw.net\/note\/?page_id=974"},"modified":"2025-09-15T12:15:09","modified_gmt":"2025-09-15T04:15:09","slug":"weblink-research","status":"publish","type":"page","link":"https:\/\/systw.net\/note\/weblink\/weblink-research","title":{"rendered":"weblink.research"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">\u53c3\u8003\u6587\u737b<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/systw.net\/note\/weblink\/weblink-security\">\u8cc7\u8a0a\u5b89\u5168<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/systw.net\/note\/weblink\/weblink-research\">\u5b78\u8853\u7814\u7a76<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/systw.net\/note\/weblink-systemnetwork\">\u7cfb\u7d71\u7db2\u8def<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/systw.net\/note\/weblink-blockchain\">\u5340\u584a\u93c8<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\u5e38\u7528\u5de5\u5177<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"http:\/\/www.guide2research.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.guide2research.com\/<\/a><br>\u67e5\u8a62Journal\u548cConference\u5f71\u97ff\u529b\u6392\u540d\u7684\u53c3\u8003<\/li>\n\n\n\n<li><a href=\"http:\/\/www.webofknowledge.com\/JCR\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.webofknowledge.com\/JCR<\/a><br>\u53ef\u67e5\u8a62journal\u5728JCR\u7684\u6392\u540d<\/li>\n\n\n\n<li><a href=\"http:\/\/www.webofknowledge.com\/wos\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.webofknowledge.com\/wos<\/a><br>WOS(Web of Science Core Collection),\u5305\u542b\u7684\u8cc7\u6599\u5eab\u6709SCIE(\u96fb\u5b50\u7248\u7684SCI)\u3001SSCI\u3001A&amp;HCI\u3001CPCI-S\u3001CPCI-SSH\u3001BCI-S\u3001BCI-SSH&#8230;,\u7531Thomson Reuters\u51fa\u7248\u793e\u5efa\u7f6e<\/li>\n\n\n\n<li><a href=\"http:\/\/www.scimagojr.com\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.scimagojr.com<\/a><br>\u514d\u8cbb\u7684\u671f\u520a\u8a55\u6bd4\u6307\u6a19\u7db2\u7ad9,\u53ef\u67e5\u8a62Journal\u7684SJR\u6392\u540d<\/li>\n\n\n\n<li><a href=\"http:\/\/www.thomsonscientific.com\/cgi-bin\/jrnlst\/jloptions.cgi?PC=J\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.thomsonscientific.com\/cgi-bin\/jrnlst\/jloptions.cgi?PC=J<\/a><br>\u67e5\u8a62journal\u662f\u5426\u6709\u6536\u9304\u9032SSCI(Social science citation index)<\/li>\n\n\n\n<li><a href=\"http:\/\/link.springer.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/link.springer.com\/<\/a><br>Springer Link,\u51fa\u7248\u793eSpringer\u7684\u8cc7\u6599\u5eab<\/li>\n\n\n\n<li><a href=\"http:\/\/dblp.uni-trier.de\/db\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/dblp.uni-trier.de\/db\/<\/a><br>dblp computer science bibliography,DBLP\u5b78\u8853\u641c\u5c0b,\u5fb7\u570b\u7279\u91cc\u723e\u5927\u5b78\u7684Michael Ley\u8ca0\u8cac\u958b\u767c\u548c\u7dad\u8b77<\/li>\n\n\n\n<li><a href=\"http:\/\/www.enago.tw\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.enago.tw\/blog\/<\/a><br>Enago\u82f1\u8ad6\u95a3\u90e8\u843d\u683c,\u5206\u4eab\u8ad6\u6587\u64b0\u5beb\u8207\u79d1\u5b78\u7814\u7a76\u7684\u767c\u8868\u65b9\u5f0f<\/li>\n\n\n\n<li><a href=\"http:\/\/www.sciencedirect.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.sciencedirect.com\/<\/a><br>ScienceDirect OnLine(SDOL),\u51fa\u7248\u793eElsevier\u7684\u8cc7\u6599\u5eab<\/li>\n\n\n\n<li><a href=\"http:\/\/dl.acm.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/dl.acm.org\/<\/a><br>ACM Digital Library,\u70baAssociation for Computing Machinery(\u8a08\u7b97\u6a5f\u5668\u5b78\u6703)\u7684\u8cc7\u6599\u5eab\uff0c\u5305\u542b\u5b78\u6703\u51fa\u7248\u7684\u671f\u520a\u3001\u96dc\u8a8c\u53ca\u6703\u8b70\u8ad6\u6587\uff0c\u4ee5\u96fb\u8166\u8cc7\u8a0a\u79d1\u5b78\u70ba\u4e3b<\/li>\n\n\n\n<li><a href=\"http:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/ieeexplore.ieee.org\/Xplore\/home.jsp<\/a><br>IEEE Xplore Digital Library,\u70baIEEE(\u7f8e\u570b\u96fb\u5b50\u96fb\u6a5f\u5de5\u7a0b\u5e2b\u5b78\u6703)\u8207IEE(\u82f1\u570b\u5de5\u7a0b\u6280\u8853\u5b78\u6703)\u7684\u8cc7\u6599\u5eab\uff0c \u5305\u542b\u5b78\u6703\u51fa\u7248\u7684\u671f\u520a\u3001\u6703\u8b70\u8ad6\u6587\u3001\u53ca\u6280\u8853\u6a19\u6e96\uff0c\u4ee5\u5de5\u7a0b\u96fb\u6a5f\u5b78\u79d1\u70ba\u4e3b\u3002<\/li>\n\n\n\n<li><a href=\"https:\/\/citeseer.ist.psu.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/citeseer.ist.psu.edu\/<\/a><br>\u7531NEC\u5efa\u7acb\u548c\u7dad\u8b77\u7684\u5b78\u8853\u641c\u5c0b<\/li>\n\n\n\n<li><a href=\"https:\/\/scholar.google.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/scholar.google.com\/<\/a><br>Google\u5b78\u8853\u641c\u5c0b<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Security Conference &amp; Journal<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/tissec.acm.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tissec.acm.org\/<\/a><br>Journal,ACM Transactions on Information and System Security (TISSEC)<\/li>\n\n\n\n<li><a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/aboutJournal.jsp?punumber=10206\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/ieeexplore.ieee.org\/xpl\/aboutJournal.jsp?punumber=10206<\/a><br>Journal, IEEE TIFS(Transactions on Information Forensics and Security),ISSN:1556-6013<\/li>\n\n\n\n<li><a href=\"https:\/\/www.computer.org\/web\/tdsc\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.computer.org\/web\/tdsc<\/a><br>Journal,IEEE TDSC(Transactions on Dependable and Secure Computing),ISSN:1545-5971<\/li>\n\n\n\n<li><a href=\"http:\/\/www.sigsac.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.sigsac.org\/<\/a><br>ASIACCS(ACM Symposium on Information, Computer and Communications Security)<\/li>\n\n\n\n<li><a href=\"http:\/\/homepages.laas.fr\/esorics\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/homepages.laas.fr\/esorics\/<\/a><br>ESORICS(European Symposium on Research in Computer Security)<\/li>\n\n\n\n<li><a href=\"http:\/\/jianying.space\/acns\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/jianying.space\/acns\/<\/a><br>ACNS(International Conference on Applied Cryptography and Network Security)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.dimva.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.dimva.org\/<\/a><br>DIMVA(SIG SIDAR Conference on Detection of Intrusions and Malware &amp; Vulnerability Assessment)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.dsn.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.dsn.org\/<\/a><br>IEEE\/IFIP DSN(International Conference on Dependable Systems and Networks)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.ieee-security.org\/CSFWweb\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.ieee-security.org\/CSFWweb\/<\/a><br>IEEE CSF(Computer Security Foundations Symposium)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.iacr.org\/meetings\/fse\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.iacr.org\/meetings\/fse\/<\/a><br>FSE(Fast Software Encryption)<\/li>\n\n\n\n<li><a href=\"https:\/\/dl.acm.org\/conference\/raid\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/dl.acm.org\/conference\/raid<\/a><br>RAID(International Symposium on Research in Attacks, Intrusions and Defenses)<\/li>\n\n\n\n<li><a href=\"https:\/\/www.acsac.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.acsac.org\/<\/a><br>ACSAC(Annual Computer Security Applications Conference)<\/li>\n\n\n\n<li><a href=\"https:\/\/petsymposium.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/petsymposium.org\/<\/a><br>PETS(Privacy Enhancing Technologies Symposium)<\/li>\n\n\n\n<li><a href=\"http:\/\/www.sigsac.org\/ccs\/ccs-history.html\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.sigsac.org\/ccs\/ccs-history.html<\/a><br>ACM CCS(Computer and Communications Security Conference),Rank 1<\/li>\n\n\n\n<li><a href=\"http:\/\/www.internetsociety.org\/events\/ndss-symposium\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.internetsociety.org\/events\/ndss-symposium<\/a><br>NDSS(Network and Distributed System Security Symposium),Rank 1<\/li>\n\n\n\n<li><a href=\"https:\/\/www.usenix.org\/conferences\/byname\/108\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.usenix.org\/conferences\/byname\/108<\/a><br>Usenix Sec(Usenix Security Symposium),Rank 1<\/li>\n\n\n\n<li><a href=\"http:\/\/www.ieee-security.org\/TC\/SP-Index.html\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.ieee-security.org\/TC\/SP-Index.html<\/a><br>IEEE S&amp;P(IEEE Symposium on Security and Privacy),Rank 1<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u53c3\u8003\u6587\u737b \u5e38\u7528\u5de5\u5177 Security Conference  &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":100,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-974","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/pages\/974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=974"}],"version-history":[{"count":1,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/pages\/974\/revisions"}],"predecessor-version":[{"id":2817,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/pages\/974\/revisions\/2817"}],"up":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/pages\/100"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}