Información Básica
Nombre: Mote Mote
Institución: University of Chinese Academy of Sciences
Registro: 2021-01-06
Puntuación: 382
CV
Conferencias Seguidas
Mostrando 31-40 de 43 elementos.
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
cbb1SOUPSInternational Symposium On Usable Privacy and Security2025-02-132025-05-122025-08-10
ccb1DIMVAInternational Conference on Detection of Intrusions and Malware & Vulnerability Assessment2025-02-122025-04-022025-07-09
b4CODASPYACM Conference on Data and Application Security and Privacy2024-12-012025-01-242025-06-04
cCT-RSAThe Cryptographer's Track at RSA Conference2024-10-152025-01-102025-04-28
ba1SAC'ACM Symposium On Applied Computing2024-10-042024-10-302025-03-31
cba2PAMPassive and Active Measurement conference2024-10-012024-11-142025-03-10
aa2ICCSInternational Conference on Computational Science2024-02-022024-04-012024-07-02
cHotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-06-152020-08-11
WOOTUSENIX Workshop on Offensive Technologies2020-05-272020-06-232020-08-10
IndocryptInternational Conference on Cryptology in India2019-08-202019-10-012019-12-15
Mostrando 31-40 de 43 elementos.
AbreviaciónNombre CompletoEntregaConferencia
SOUPSInternational Symposium On Usable Privacy and Security2025-02-132025-08-10
DIMVAInternational Conference on Detection of Intrusions and Malware & Vulnerability Assessment2025-02-122025-07-09
CODASPYACM Conference on Data and Application Security and Privacy2024-12-012025-06-04
CT-RSAThe Cryptographer's Track at RSA Conference2024-10-152025-04-28
SAC'ACM Symposium On Applied Computing2024-10-042025-03-31
PAMPassive and Active Measurement conference2024-10-012025-03-10
ICCSInternational Conference on Computational Science2024-02-022024-07-02
HotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-08-11
WOOTUSENIX Workshop on Offensive Technologies2020-05-272020-08-10
IndocryptInternational Conference on Cryptology in India2019-08-202019-12-15
Conferencias Asistidas
Mostrando 1-10 de 11 elementos.
CCFCOREQUALISAbreviaciónNombre CompletoConferenciaUbicación
cbb1AsiaCCSACM ASIA Conference on Computer and Communications Security2021-06-07Hong Kong, China
cbb1ICICSInternational Conference on Information and Communications Security2021-09-17Chongqing, China
cba2ISCInformation Security Conference2020-12-16Bali, Indonesia
ccNSPWNew Security Paradigms Workshop2021-10-25North Conway, New Hampshire, USA
cbb1SecureCommInternational ICST Conference on Security and Privacy in Communication Networks2021-09-06Online
b4CODASPYACM Conference on Data and Application Security and Privacy2021-03-22Baltimore, Maryland, USA
cba2PAMPassive and Active Measurement conference2021-03-31Online
cHotSecUSENIX Workshop on Hot Topics in Security2020-08-11Boston, Massachusetts, USA
WOOTUSENIX Workshop on Offensive Technologies2020-08-10Boston, Massachusetts, USA
bIWSECInternational Workshop on Security2019-08-28Tokyo, Japan
Mostrando 1-10 de 11 elementos.
Nombre CompletoConferenciaUbicación
ACM ASIA Conference on Computer and Communications Security2021-06-07Hong Kong, China
International Conference on Information and Communications Security2021-09-17Chongqing, China
Information Security Conference2020-12-16Bali, Indonesia
New Security Paradigms Workshop2021-10-25North Conway, New Hampshire, USA
International ICST Conference on Security and Privacy in Communication Networks2021-09-06Online
ACM Conference on Data and Application Security and Privacy2021-03-22Baltimore, Maryland, USA
Passive and Active Measurement conference2021-03-31Online
USENIX Workshop on Hot Topics in Security2020-08-11Boston, Massachusetts, USA
USENIX Workshop on Offensive Technologies2020-08-10Boston, Massachusetts, USA
International Workshop on Security2019-08-28Tokyo, Japan
Revistas Seguidas
Mostrando 1-2 de 2 elementos.
CCFNombre CompletoFactor de ImpactoEditorISSN
cInformation Management & Computer SecurityEmerald0968-5227
cComputer Law and Security Review3.300Elsevier0267-3649
Mostrando 1-2 de 2 elementos.
Nombre CompletoFactor de ImpactoEditor
Information Management & Computer SecurityEmerald
Computer Law and Security Review3.300Elsevier
Investigadores Seguidos
NombreInstituciónRegistroScore
No se encontraron resultados.
NombreInstituciónScore
No se encontraron resultados.