Call for Tutorial Proposals

Tutorial Proposals Submission is closed now

Download the PDF Version

International Conference on Information and Systems Security (ICISS) is one of the leading conferences on security & privacy. The audience of ICISS is usually a mix of international researchers, graduate & post graduate students, industry practitioners, and a large portion of under graduate engineering students who are exploring their career paths in the field of security & privacy. ICISS 2022 will be hosted by the Indian Institute of Technology - Tirupati, situated at the foothills of the famous Saptagiri (representing the seven heads of Adishesha!) This year's edition of the ICISS will be organized in physical mode.

The Tutorial chairs of the 18th ICISS invite proposals for tutorials covering topics that fall within the scope of ICISS conference. We specially encourage industry practitioners to share their expertise through hands-on sessions. The proposal must include the following as a single PDF using LNCS style.

  1. Title & Abstract (~ 250 words)
  2. Tutorial structure (4 pages max.)
  3. Target audience (research/practice)
  4. Prerequisites & pointers (1 page max.)
  5. CV of the speaker(s)

Each proposal will be evaluated on the basis of its technical quality, duration (between 2 to 4 hours), expertise of the presenters, expected suitability to the audience of ICISS. A non-exhaustive list of (suggestive) topics that would be beneficial to the audience of ICISS is given below:

  • Android/iOS Security
  • Data (De)Anonymization Techniques
  • Comparison of Blockchain Frameworks
  • Smart Contracts
  • Secure Coding Techniques
  • OWASP Top 10 Attacks & Mitigation
  • Security/Privacy aspects in AI/ML
  • Privacy-by-Design
  • Threat Modeling
  • Emerging Trends in Security
  • Digital Forensics
  • Offensive Security Tools/Techniques
  • Security Analytics/Visualization Methods
  • Building a SoC (from EDR to XDR)
  • SecOps, SecDevOps, Best Practices
  • Virtualization & micro-services for Security
  • Techniques of Malware Design/Deployment
  • Security in Cyber-Physical Systems
  • Fuzzing Techniques
  • Cryptographic Techniques for S&P
  • S&P in FinTech, Healthcare

Important Dates (AoE)

Proposal Submission

The proposal must be written in English and submitted to iciss2022_tutorials@iittp.ac.in as a single PDF file prepared using the Springer Verlag LNCS Latex or Word style

Tutorial Chairs

For any queries, please contact icissconf22@gmail.com