Call for Articles for ISEA

About ISEA: Information Security Education and Awareness (ISEA) is a Ministry of Electronics and Information Technology (MeitY), GoI initiative with an objective of capacity building in the area of Information Security, training of Government personnel and creation of mass awareness on Information Security awareness targeted towards Students, Women, Police and other user segments. The Centre for Development of Advanced Computing (C-DAC), Hyderabad is implementing this initiative.

As part of this Initiative a multilingual web portal www.infosecawareness.in has been developed with abundant multimedia content for various user segments by covering the various areas of the cyber security

ISEA Annual Magazine is planned release to bring out the various developments in the area of Information Security (IS) and also various activities being carried out under the programme to the Academic and Government institutions. This annual magazine would be widely circulated in both print as well as electronic form. It includes articles, interviews and testimonials from experts with diverse backgrounds and who have significantly contributed in new areas of research in the domain of cyber security and awareness generation. ISEA extends an invitation to contribute articles to Annual magazine.

The Articles should be under the Cyber security domain falling under the technology areas such as Mobile security, Trends in Malware, Blockchain security, Machine learning for Cyber Security, Big Data security, Embedded system security, virtualization & cloud security, Secure Software development, Critical Infrastructure security, IoT security, Cyber forensics, Social media security, Digital finance Security, Cyber Security promotion in Academic Institutions and but not limited.

Article should fall in one of the sections of the magazine. Details of Magazine sections are given in Annexure I. You can go through Previous ISEA - Annual Magazine for details about the articles published previously.

Prospective authors are encouraged to write an article specifically for the magazine. Authors could be professionals / teachers working in the field of cyber security, academicians teaching computer science, LEA’s etc. We encourage authors to cover new developments in the cyber security domain covering various facets of cyber security, cybercrimes and awareness etc. We invite innovative and stimulating articles related to but not restricted to the categories given above. The article needs to be submitted through email to pmu-isea@cdac.in / isea@cdac.in Subject title “ISEA Annual Magazine 2020: Topic:_____________ by Author(s) Name:_______________” latest by 5th October,2019.

Important Dates:

Abstract for article submission: 31st August, 2019
Short Paper/Short Poster Presentation: 16th September, 2019
Intimation to Authors for selected articles: 30th September, 2019
Last date for submission of full articles: 21st November, 2019
Release of Annual magazine: January,2020

Guidelines for Authors:

  • Articles/ short papers/ Paper presentation are expected in simple language and even technical oriented, still the articles may need to be useful for general audience too.
  • The abstract of Articles/ short papers/ Paper presentation not more than 150 words.
  • The articles should be one page to max three pages & maximum 1200 words, and must be an exclusive contribution for the Annual Magazine.
  • The cover page should contain the title of the paper, author’s name, designation, official address, contact phone numbers, e-mail address and Photos of the author(s)
  • Please indicate the section under which your article fits into
    References should be given at the end of the manuscript and should contain only those cited in the text of the manuscript.
  • The contribution must be original in nature and is neither published nor under consideration for publication anywhere else.
  • Figures and tables should be numbered consecutively and should appear near the text where they are first cited. The figures must be in editable format. Captions of the figures and tables are to be given at the bottom and at the top respectively. Headlines of the sections and sub-sections should start from the left-hand margin.
  • The final decision on the acceptances or otherwise of the Article rests with the competent authority /editorial board and it depends entirely on its standard and relevance. The final draft may be subjected to editorial amendment to suit the Annual Magazine requirements.
  • If an article is not published within 6 months from the date of submission, we keep the article with the Institute for future publication, unless it is rejected.
  • The copyright of the contributions published in the Annual Magazine lie with the publishers of the Annual Magazine and published in any platform
  • The Editor has the right to modify / edit any content / title of the submitted article to suit the category/section /need of the Annual Magazine, without affecting the spirit of the article.
  • A scanned copy of signed Declaration by the author is to be attached with the article. The format of the declaration is given below.
  • A scanned passport size photograph (at least, 600 dpi) of the author and in case of joint authorship of all the authors should also be mailed along with the soft copy of the article.

Declaration: I / We affirm that the article titled ‘____________’ is my / our original contribution and no portion of it has been copied from any other source, and it would not be sent elsewhere for publication. The views expressed in this article are not necessarily those of the Institute or the Editor of the ISEA Annual Magazine.

  1. Date: (Signature)
  2. Place:
  3. Name:
  4. Designation:
  5. Organization:
  6. mail ID:
  7. Contact No:

Annexure I: Sections of Magazine

Fore Front

This Section gives a brief understanding about the emerging concepts in the Information Security Research by emphasizing on the need for outstanding solutions to solve existing challenges in the latest technologies. You can also have an insight on the initiatives by CERT-In’ in Cyber security Training and Awareness.

Go Mobile

With the increasing popularity of smart phones the use of cloud services for mobile applications has also increased by many folds. There are some issues and challenges with respect to privacy and security of your data stored and the way we handle our mobiles.

Living in the world of smart phones, we need to be cautious while handling our data and using various features, thus this section highlights on certain security measures for smartphones.

Social Media Security

Keeping in view of the rate at which internet penetration is going on in India we present you the use of new technologies and techniques for ensuring safe social media use. Let us also have a glance on the role that media can play in balancing privacy and personal security of an individual while enjoying the benefits of social media.

Malware Reviewed

This section gives you an insight on sophisticated techniques used by cybercriminals to fetch your information leading to personal and financial loss.

Cyber Invasion

Cyber Invasion is a kind of an attempt to expose alter, disable, destroy, steal or gain an unauthorized use of assets and how to secure them

Cyber Bunker

A set of security practices in terms of code patterns, architecture, configuration and deployment. It will provide an in-depth understanding of the secure implementation of tools and technologies to the readers.

Reinforce

The Apprentices of information technology from prominent academicians provide much needed reinforcement by publishing their research. The ideas presented here can motivate you to take up advanced research in the Information security domain.

CodeGeek

As an atom is to a chemical element, so is the code to a software application. The section brings in a short overview of advanced coding vulnerabilities present in software applications. It also gives detailed explanations on various approaches that a penetration tester needs to understand.

Critical Infrastructure Security

Creating awareness among the critical infrastructure industries is important to make them future ready for any form of cyber threats that they may face. This section briefs about all necessary measures to be taken to facilitate safe, secure, and resilient Critical Information Infrastructure in the country. It also discusses about the use of emerging technologies to secure Critical Information Infrastructure.

Cyber Investigations and Cyber Forensics

As per the current state of research in database forensics a proper mechanism is needed for data recovery from devices. This section presents you the recent trends for data recovery in digital forensics.

The last edition of InfoSec Depot - 2019 annual magazine can be downloaded from the following links. Copy and paste link to download

InfoSecDepot2019

isea-loading.gif