posted by user: yaseramd1 || 3297 views || tracked by 2 users: [display]

FCST 2020 : The 3rd International Symposium on Future Cyber Security Technologies

FacebookTwitterLinkedInGoogle

Link: http://emergingtechnet.org/FCST2020/
 
When Dec 14, 2020 - Dec 16, 2020
Where Paris, France
Submission Deadline Nov 5, 2020
Notification Due Nov 15, 2020
Final Version Due Dec 1, 2020
Categories    cyber security   blockchain   edge and cloud   security
 

Call For Papers

ardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The 3rd International Symposium on Future Cyber Security Technologies (FCST 2020) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.

The 3rd IEEE International Symposium on Future Cyber Security Technologies (FCST 2020) will be a forum for scientists, researchers, students, and practitioners to present their latest research results, ideas, developments, and applications in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G, SDN and many others . We are mainly interested in receiving state of the art work on different aspect of future cyber security management system, security and privacy, cloud computing and big data supported security systems to mention but few.

The topics of interest for this workshop include, but are not limited to:

Cyber Security Techniques Architectures and Design
Cyber Security Systems
Cyber Security Techniques Integration
Cyber Security Techniques Orchestration
Cyber Security Techniques Based Network Control plane design
Cyber Security Techniques Based NetworkData plane design
Cyber Security Techniques Performance Management
Cyber Security Techniques for Cloud based DataCenter
Cyber Security Techniques for 5G Networks
Cyber Security Techniques for Internet of Things (IoT)
Cyber Security Techniques for Big Data Computing
Cyber Security Techniques for large scale storage system

Related Resources

CyberHunt 2021   IEEE Workshop on Cyber Threat Intelligence and Hunting with AI
Spec.Issue on Social Informatics: Scopus 2021   Journal of Social and Business Informatics - Acta Informatica Pragensia
ICCWS 2022   17th International Conference on Cyber Warfare and Security
IOTBS 2021   International Conference on IOT, Big Data and Security
IoTSP 2021   Internet of Things Security and Privacy: Practical and Management Perspectives
BIOM 2021   International Conference on Big Data, IoT and Machine Learning
IEEE CSP--EI, Scopus 2022   2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022)--EI Compendex, Scopus
CRBL 2021   International Conference on Cryptography and Blockchain
SITAIBA 2021   SITAIBA 2021 : 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications
CTCM 2021   7th International Conference of Control Theory and Computer Modelling