{"id":56,"date":"2023-04-28T22:08:17","date_gmt":"2023-04-28T16:38:17","guid":{"rendered":"http:\/\/iciss.isrdc.in\/?page_id=56"},"modified":"2023-06-15T13:03:46","modified_gmt":"2023-06-15T07:33:46","slug":"tutorials","status":"publish","type":"page","link":"https:\/\/iciss.isrdc.in\/tutorials\/","title":{"rendered":"Call for Tutorials"},"content":{"rendered":"\n<p><em>International Conference on Information and Systems Security (ICISS) is one of the leading conferences on security &amp; privacy. The audience of ICISS is usually a mix of international researchers, graduate &amp; post-graduate students, industry practitioners, and a large portion of undergraduate engineering students who are exploring their career paths in the field of security &amp; privacy.<\/em><\/p>\n\n\n\n<p>The Tutorial Chairs of the 19th ICISS conference invite proposals for tutorials covering topics that fall within the scope of the conference. <span class=\"has-inline-color has-vivid-purple-color\">We especially encourage industry practitioners to share their expertise through hands-on sessions.<\/span> The proposal must include the following as a single PDF using <a href=\"https:\/\/www.springer.com\/gp\/computer-science\/lncs\/conference-proceedings-guidelines\" data-type=\"URL\" data-id=\"https:\/\/www.springer.com\/gp\/computer-science\/lncs\/conference-proceedings-guidelines\" target=\"_blank\" rel=\"noreferrer noopener\">LNCS style<\/a>.<\/p>\n\n\n\n<ol><li>Title &amp; Abstract (~ 250 words)<\/li><li>Tutorial structure (4 pages max.)<\/li><li>Target audience (researchers\/practitioners\/mix)<\/li><li>Prerequisites and reference material (1 page max.)<\/li><li>CV of the speaker(s)<\/li><\/ol>\n\n\n\n<p>Each proposal will be evaluated on the basis of its technical quality, duration (between 2 to 12 hours), the expertise of the presenters, and expected suitability to the audience of ICISS.<\/p>\n\n\n\n<p>A <em>non-exhaustive <\/em>list of (<em>suggestive<\/em>) topics that would be beneficial to the audience of ICISS is given below:<\/p>\n\n\n\n<p>&#8211; Android\/iOS Security<br>&#8211; Data (De)Anonymization Techniques<br>&#8211; Comparison of Blockchain Frameworks<br>&#8211; Smart Contracts<br>&#8211; Secure Coding Techniques<br>&#8211; OWASP Top 10 Attacks &amp; Mitigation<br>&#8211; Security\/Privacy aspects in AI\/ML<br>&#8211; Privacy-by-Design<br>&#8211; Threat Modeling<br>&#8211; Emerging Trends in Security<br>&#8211; Digital Forensics<br>&#8211; Offensive Security Tools\/Techniques<br>&#8211; Security Analytics\/Visualization Methods<br>&#8211; Building an SoC (from EDR to XDR)<br>&#8211; SecOps, SecDevOps, Best Practices<br>&#8211; Virtualization &amp; micro-services for Security <br>&#8211; Techniques of Malware Design\/Deployment <br>&#8211; Security in Cyber-Physical Systems<br>&#8211; Fuzzing Techniques<br>&#8211; Cryptographic Techniques for S&amp;P<br>&#8211; S&amp;P in FinTech, Healthcare<\/p>\n\n\n\n<h5>Important Dates (in AoE)<\/h5>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td>Submission deadline<\/td><td>September 4, 2023<\/td><\/tr><tr><td>Author notification by<\/td><td>October 25, 2023<\/td><\/tr><tr><td>Final submission<\/td><td>December 2, 2023<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h5>Tutorial Chairs<\/h5>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td>Shachee Mishra Gupta<\/td><td>IBM Research, India<\/td><\/tr><tr><td>Vishwas Patil<\/td><td>IIT Bombay<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Submission template:&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.springer.com\/gp\/computer-science\/lncs\/conference-proceedings-guidelines\" target=\"_blank\">https:\/\/www.springer.com\/gp\/computer-science\/lncs\/conference-proceedings-guidelines<\/a><\/p>\n\n\n\n<p>Submission portal: <a href=\"https:\/\/easychair.org\/conferences\/?conf=iciss20231\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/easychair.org\/conferences\/?conf=iciss20231<\/a> <\/p>\n\n\n\n<p>Queries: ivishwas@gmail.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>International Conference on Information and Systems Security (ICISS) is one of the leading conferences on security &amp; privacy. The audience of ICISS is usually a mix of international researchers, graduate &amp; post-graduate students, industry practitioners, and a large portion of undergraduate engineering students who are exploring their career paths in the field of security &amp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/56"}],"collection":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":10,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/56\/revisions"}],"predecessor-version":[{"id":435,"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/pages\/56\/revisions\/435"}],"wp:attachment":[{"href":"https:\/\/iciss.isrdc.in\/wp-json\/wp\/v2\/media?parent=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}