Poster Contest 2015

Call for Posters

We encourage students, faculty, researchers and security practitioners to submit their innovative ideas and on-going project work in the area of Cyber Security and Privacy, to seek feedback from the domain experts and prosper further collaborations.

Each submission must explicitly explain motivation, methodology, results, and implications of the results. A submission of the paper is limited to two pages including the theme, abstract and overview of the poster. Please note that you may also submit entries based on your previously published / submitted work as well (published after July 2015), with a mention about it in submission / publication.

Posters will be reviewed by the committee on the basis of novelty of theme, clarity of thought and likely impact. Authors of accepted papers will be asked to create a poster to present their work at the NASSCOM- DSCI Annual Information Security Summit 2015 in a form of posters.

Posters are invited on all areas in Security and Privacy (but not limited to). Each paper should maximum have 5 members:

  • Machine Learning & Robotics: societal, ethical and legal ramifications
  • Call for Digital Age, what about the trust?
  • Cities becoming smart, would they be safe and secure too?
  • Cyber Kill Chain inflicting kinetic [unrecoverable] damages
  • Innovative, dynamic & organized threats: how should security respond?
  • Devices, things & everything on Internet: where it’s taking us?
  • National security, what about privacy?
  • Crimes go cyber. In fact, every crime has some cyber connotations
  • Cyber Security, reason to worry, cause of concern or big opportunity ahead?
  • Big Data everywhere, does it make sense for security?
  • Encryption: Giving control back to the end user
  • Ports, Airports, Pipes, Energy & Transport: SCADA Security


    For any further query feel free to write to udita{dot}singh{at}dsci{dot}in or call at M: +91-11-26155071

Shortlisted Papers

Topic of the Paper Institute Name of the Team Members
Quantization of Trust in Online Social Network Indira Gandhi Delhi Technical University for Women Rishabh Kaushal, Pratima
Cities becoming smart, would they be safe and secure too? Rakshashakti University, Ahemdabad Khimani Hemangi, Shah Kuntal
Mac Layer Management frame Denial of Service Attacks Indira Gandhi Delhi Technical University for Women Jaspreet Kaur, Rishabh Kaushal
Devices, things & everything on Internet: where it’s taking us? Jaypee Institute of Information Technology Sonu Gupta
Privacy issues in Digital Forensics JIIT NOIDA Swati Sharma
Detecting PII from data leakage in Mobile Ads IIIT Delhi Jayaprakash Govindaraj, Robin Verma
An Architecture for Intrusion Detection using Autonomous Agents Jaypee Institute of Information Technology Saumya Singh
Software Forensics Jaypee institute of Information Technology Neelam Uttam Chandani
A Study on DDoS Attack and Defense Mechanism Jaypee Institue of Information Technology Ritu Banga
Classification of Spam Reporters and Reportees in Twitter Indira Gandhi Delhi Technical University for Women Pooja Sinha, Oshin Maini, Gunjan Malik, Rishabh Kaushal
Creation and Impact of SocialBots in Twitter Indira Gandhi Delhi Technical University for Women Madhuri Dewangan, Rishabh Kaushal