{"id":236,"date":"2026-05-07T17:54:18","date_gmt":"2026-05-07T17:54:18","guid":{"rendered":"https:\/\/csnet-conference.org\/2026\/?page_id=236"},"modified":"2026-05-07T17:54:19","modified_gmt":"2026-05-07T17:54:19","slug":"call-for-tutorials","status":"publish","type":"page","link":"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/","title":{"rendered":"Call For Tutorials"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Call For Tutorials<\/mark><\/strong><\/h2>\n\n\n\n<p>The 10th Cyber Security in Networking Conference (CSNet 2026) will be held on October 21-23, 2026, in Nicosia, Cyprus. The event addresses different topics related to Cybersecurity and AI technology. Tutorials are an integral part of the CSNet program. They provide participants with broad and comprehensive overviews of the cybersecurity-related ideas and concepts.\u00a0 They include theoretical issues as well as implementation issues.\u00a0 Half-day tutorials will take place on October 21, 2026, on the first day of the CSNet conference.<\/p>\n\n\n\n<p><strong>Topics include but are not limited to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Advanced AI for Cybersecurity<\/li>\n\n\n\n<li>AI-based Cybersecurity for Next-Generation Technologies<\/li>\n\n\n\n<li>Challenges and Opportunities in AI-driven Security<\/li>\n\n\n\n<li>Emerging AI Threats and Countermeasures<\/li>\n\n\n\n<li>Privacy Preservation in AI-driven Security<\/li>\n\n\n\n<li>Privacy-preserving AI for Surveillance and Monitoring<\/li>\n\n\n\n<li>Cognitive Security and Adaptive Defense Mechanisms<\/li>\n\n\n\n<li>Advanced Deep Learning Techniques for Cyber Defense<\/li>\n\n\n\n<li>Blockchain<\/li>\n\n\n\n<li>Cloud Security<\/li>\n\n\n\n<li>Cognitive Cyber Security<\/li>\n\n\n\n<li>Cyber-attacks &amp; defense<\/li>\n\n\n\n<li>Cyber-Physical System (CPS) Security<\/li>\n\n\n\n<li>Cybersecurity and Human Rights<\/li>\n\n\n\n<li>Data Center Network Control, Security, and Optimization<\/li>\n\n\n\n<li>Decentralized Security<\/li>\n\n\n\n<li>Resilient Networks and Systems<\/li>\n\n\n\n<li>Secure Protocol Design and Key Management<\/li>\n\n\n\n<li>Secure Architecture Design<\/li>\n\n\n\n<li>Secure Network Design<\/li>\n\n\n\n<li>Security Policies Design<\/li>\n\n\n\n<li>Security for the Internet of Things<\/li>\n\n\n\n<li>Security in Fog\/edge Computing<\/li>\n\n\n\n<li>AI-driven Intrusion Detection and Prevention Systems<\/li>\n\n\n\n<li>AI-driven Security Monitoring and Anomaly Detection<\/li>\n\n\n\n<li>Cyber Threat Intelligence and Information Sharing<\/li>\n\n\n\n<li>AI-based Cybersecurity for IoT and Fog\/edge Computing<\/li>\n\n\n\n<li>Adversarial Machine Learning and AI Security<\/li>\n\n\n\n<li>AI for Cyber Resilience and Incident Response Strategies<\/li>\n\n\n\n<li>AI for Biometric Security<\/li>\n\n\n\n<li>AI for Secure Software Development and DevSecOps<\/li>\n\n\n\n<li>AI-enabled Threat Hunting and Cyber Forensics<\/li>\n\n\n\n<li>AI-enabled Ethical Hacking<\/li>\n\n\n\n<li>AI for Blockchain Technology<\/li>\n\n\n\n<li>AI-based Secure Cloud Computing and Data Protection<\/li>\n\n\n\n<li>AI-based\u00a0 Cybersecurity in Smart Cities\/Grids and Urban Environments<\/li>\n\n\n\n<li>AI for Secure Authentication and Access Control Mechanisms<\/li>\n\n\n\n<li>AI-powered Threat Modeling and Risk Assessment<\/li>\n\n\n\n<li>AI-driven Security Automation and Orchestration<\/li>\n\n\n\n<li>Secure AI Model Training and Adversarial Mitigation<\/li>\n\n\n\n<li>AI-driven Security Operations Center (SOC)<\/li>\n\n\n\n<li>Secure Federated Learning<\/li>\n\n\n\n<li>Federated Learning cybersecurity solutions<\/li>\n\n\n\n<li>LLM-based Anomaly Detection<\/li>\n\n\n\n<li>LLM-based Malware Detection and Classification<\/li>\n\n\n\n<li>Secure Deployment of LLM-based Security Solutions<\/li>\n\n\n\n<li>AI for Hardware-Based Attacks<\/li>\n\n\n\n<li>AI-based Vulnerability Assessment and Patch Prioritization<\/li>\n\n\n\n<li>Zero-Day Attack Detection Using AI-based Techniques<\/li>\n\n\n\n<li>Ethical and Regulatory Considerations in AI-based Security<\/li>\n\n\n\n<li>Reinforcement Learning-based Cybersecurity Solutions<\/li>\n\n\n\n<li>Human-AI collaboration in Security Operation Centers (SOC)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Submission guidelines<\/mark><\/strong><\/h3>\n\n\n\n<p>If interested in delivering a tutorial at CSNet 2026, you are invited to prepare a single PDF file (4 pages maximum) that must include the following information:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Tutorial Title<\/strong><\/li>\n\n\n\n<li><strong>Abstract<\/strong>: A concise description of the content and goals of the tutorial<\/li>\n\n\n\n<li>\u00a0<strong>Information about Instructor<\/strong>(s):<\/li>\n\n\n\n<li>First and Last Name<\/li>\n\n\n\n<li>Position<\/li>\n\n\n\n<li>Affiliation and address<\/li>\n\n\n\n<li>Email and Homepage (if existing)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/li>\n\n\n\n<li><strong>Tutorial Description<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Any additional information beyond the abstract describing the tutorial.&nbsp; For eg:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Is this a survey of several topics, or an in-depth study of one?<\/li>\n\n\n\n<li>How the tutorial topic is linked with AI?\u00a0<\/li>\n\n\n\n<li>Why do you consider your tutorial topic to be important? What will the participants learn?<\/li>\n\n\n\n<li><strong>Outline<\/strong>: Please give a rough overview of the tutorial schedule (topics).<\/li>\n\n\n\n<li><strong>Biographical Sketch<\/strong>: Short CV, including information on prior teaching &amp; research experience (courses, projects, etc.).<\/li>\n\n\n\n<li><strong>Prior History:\u00a0<\/strong>Please indicate whether an earlier version of this tutorial has been presented before. If so, when and where? Have the instructors given other tutorials in the past?<\/li>\n\n\n\n<li><strong>Major References<\/strong>: This list will help identify the scope.<\/li>\n\n\n\n<li><strong>Supplementary Materials:\u00a0<\/strong>Anything that might help the reviewers evaluate the proposal, such as sample viewgraphs, links to potential course web pages of the instructor, or, if already available, draft tutorial slides.<\/li>\n<\/ul>\n\n\n\n<p><strong>Please submit the tutorial proposal in\u00a0<a href=\"https:\/\/edas.info\/newPaper.php?c=35098&amp;track=138430\">EDAS<\/a><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Important dates<\/mark><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tutorial Submission Deadline:\u00a0<strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">July 30, 2026<\/mark><\/strong><\/li>\n\n\n\n<li>Notification of Acceptance: August 15, 2026<\/li>\n\n\n\n<li>Tutorial material: September 30, 2026<\/li>\n\n\n\n<li>Presentation: October 21, 2026<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Call For Tutorials The 10th Cyber &hellip; <a href=\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-236","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Call For Tutorials - CSNet 2026<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Call For Tutorials - CSNet 2026\" \/>\n<meta property=\"og:description\" content=\"Call For Tutorials The 10th Cyber &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/\" \/>\n<meta property=\"og:site_name\" content=\"CSNet 2026\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T17:54:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/\",\"name\":\"Call For Tutorials - CSNet 2026\",\"isPartOf\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\"},\"datePublished\":\"2026-05-07T17:54:18+00:00\",\"dateModified\":\"2026-05-07T17:54:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/csnet-conference.org\/2026\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Call For Tutorials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#website\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"name\":\"CSNet 2026\",\"description\":\"10th Cyber Security in Networking Conference\",\"publisher\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#organization\",\"name\":\"CSNet 2026\",\"url\":\"https:\/\/csnet-conference.org\/2026\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"contentUrl\":\"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png\",\"width\":512,\"height\":512,\"caption\":\"CSNet 2026\"},\"image\":{\"@id\":\"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Call For Tutorials - CSNet 2026","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/","og_locale":"en_US","og_type":"article","og_title":"Call For Tutorials - CSNet 2026","og_description":"Call For Tutorials The 10th Cyber &hellip; Continue reading &rarr;","og_url":"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/","og_site_name":"CSNet 2026","article_modified_time":"2026-05-07T17:54:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/","url":"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/","name":"Call For Tutorials - CSNet 2026","isPartOf":{"@id":"https:\/\/csnet-conference.org\/2026\/#website"},"datePublished":"2026-05-07T17:54:18+00:00","dateModified":"2026-05-07T17:54:19+00:00","breadcrumb":{"@id":"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csnet-conference.org\/2026\/call-for-tutorials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/csnet-conference.org\/2026\/"},{"@type":"ListItem","position":2,"name":"Call For Tutorials"}]},{"@type":"WebSite","@id":"https:\/\/csnet-conference.org\/2026\/#website","url":"https:\/\/csnet-conference.org\/2026\/","name":"CSNet 2026","description":"10th Cyber Security in Networking Conference","publisher":{"@id":"https:\/\/csnet-conference.org\/2026\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csnet-conference.org\/2026\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csnet-conference.org\/2026\/#organization","name":"CSNet 2026","url":"https:\/\/csnet-conference.org\/2026\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/","url":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","contentUrl":"https:\/\/csnet-conference.org\/2026\/wp-content\/uploads\/2026\/02\/cropped-csnet_logo_2026-01.png","width":512,"height":512,"caption":"CSNet 2026"},"image":{"@id":"https:\/\/csnet-conference.org\/2026\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/comments?post=236"}],"version-history":[{"count":1,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/236\/revisions"}],"predecessor-version":[{"id":237,"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/pages\/236\/revisions\/237"}],"wp:attachment":[{"href":"https:\/\/csnet-conference.org\/2026\/wp-json\/wp\/v2\/media?parent=236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}