Dates
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Fri 23 Feb

Displayed time zone: Chennai, Kolkata, Mumbai, New Delhi change

08:30 - 09:00
Inauguration CeremonyResearch Papers at Room 1 - R103
08:30
30m
Other
Inauguration Ceremony
Research Papers

11:00 - 11:30
Tea BreakBreak at Tea Venue
11:00
30m
Coffee break
Break
Break

13:00 - 14:00
13:00
60m
Lunch
Lunch
Break

14:00 - 15:00
14:00
60m
Poster
Student Poster Showcase
Student Posters Session

15:00 - 15:30
Tea BreakBreak at Tea Venue
15:00
30m
Coffee break
Break
Break

18:00 - 19:30
Cultural ProgrammeResearch Papers at Auditorium
18:00
90m
Other
Cultural Programme
Research Papers

19:30 - 21:00
19:30
90m
Dinner
Dinner
Break

Sat 24 Feb

Displayed time zone: Chennai, Kolkata, Mumbai, New Delhi change

11:00 - 11:15
Tea BreakBreak at Tea Venue
11:00
15m
Coffee break
Break
Break

13:00 - 14:00
13:00
60m
Lunch
Lunch
Break

15:00 - 15:30
Tea BreakBreak at Tea Venue
15:00
30m
Coffee break
Break
Break

Call for Posters

ISEC 2024 will host a Student Posters Session, a forum for students to present their research work to the conference attendees. It is an excellent opportunity for students to get feedback, learn how to clearly communicate their research, and network with the leading experts in the field.

Best poster awards

As a bonus, there will be prizes for the best posters, judged on the basis of significance of the problem and clarity of exposition.

Eligibility

Students who:

  • are currently enrolled in an undergraduate or graduate program, OR
  • have finished their undergraduate or masters and are currently employed in a temporary research associate or research fellow position

are eligible for participation (in case of uncertainty, please email the chairs).

Submission guidelines

Submission link: https://forms.gle/BNpquaR8Kn8ybS5v6

To participate, submit a 1-page abstract. The abstract should clearly specify the problem, why is it important, the proposed solution, and the results, if any. Early-stage ideas are more than welcome; in such cases, an argument for why the solution may work should be provided. The abstracts will be peer-reviewed and selected abstracts will be invited to the poster session. Details on how to prepare the posters will be shared with the acceptance notification.

Selected Posters:

TechBrij: HTML Table
AuthorPaper Title
Mrigank PawagiAdapting Techniques from Software Testing to Benchmark and Utilize Large Language Models for Code
Rudra Dhar, Karthik Vaidhyanathan, Vasudeva VarmaLeveraging Generative AI for Architectural Knowledge Management
Shubham Kulkarni, Arya Marda, Karthik VaidhyanathanAdaMLS: A Self-adaptive Approach for Enhancing the Quality of Service of ML-enabled Systems
Kautuk RajFrom Liberating to Questioning PDF-Tabular Data
Dheeraj Sairam K, Chakradhar VCoverage-criteria based Testing based on IoT Application Architectures
Sarthak Das, Rajarshi RayModeling and Verification of Multi-Agent Cyber-Physical Systems in Verse: A Case Study
Debanshu Das, Rajesh KumarPredicting Cyber-Attacks on Web Infrastructures: In-Depth Exploration through the Lens of Petri Nets
Soumili Ghosh, Subhajit Datta, Subhashis MajumderSoftware Defect Prediction: What Works Best?
Adarsh Sudheer, Farzana Shahjahan,Anagha S Menon, Harikrishnan S, Varsha P SExploring Path Search Strategies for Symbolic Execution
Yaswanth R, Varsha P SureshSearch Strategy based on Ant Colony Optimization for Symbolic Execution

TechBrij: HTML Table
AuthorPaper Title
Mrigank PawagiAdapting Techniques from Software Testing to Benchmark and Utilize Large Language Models for Code
Rudra Dhar, Karthik Vaidhyanathan, Vasudeva VarmaLeveraging Generative AI for Architectural Knowledge Management
Shubham Kulkarni, Arya Marda, Karthik VaidhyanathanAdaMLS: A Self-adaptive Approach for Enhancing the Quality of Service of ML-enabled Systems
Kautuk RajFrom Liberating to Questioning PDF-Tabular Data
Dheeraj Sairam K, Chakradhar VCoverage-criteria based Testing based on IoT Application Architectures
Sarthak Das, Rajarshi RayModeling and Verification of Multi-Agent Cyber-Physical Systems in Verse: A Case Study
Debanshu Das, Rajesh KumarPredicting Cyber-Attacks on Web Infrastructures: In-Depth Exploration through the Lens of Petri Nets
Soumili Ghosh, Subhajit Datta, Subhashis MajumderSoftware Defect Prediction: What Works Best?
Adarsh Sudheer, Farzana Shahjahan,Anagha S Menon, Harikrishnan S, Varsha P SExploring Path Search Strategies for Symbolic Execution
Yaswanth R, Varsha P SureshSearch Strategy based on Ant Colony Optimization for Symbolic Execution