posted by user: yaseramd1 || 249 views || tracked by 2 users: [display]

FCST 2018 : The 1st International Symposium on Future Cyber Security Technologies

FacebookTwitterLinkedInGoogle

Link: http://emergingtechnet.org/FCST2018/
 
When Oct 15, 2018 - Oct 18, 2018
Where Valencia, Spain
Submission Deadline Jul 15, 2018
Notification Due Aug 25, 2018
Final Version Due Sep 5, 2018
Categories    cyber security   intrusion detection systems   cyber security controls   iot security
 

Call For Papers

Hardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The 1st International Symposium on Future Cyber Security Technologies (FCST 2018) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.

The 1st IEEE International Symposium on Future Cyber Security Technologies (FCST 2018) will be a forum for scientists, researchers, students, and practitioners to present their latest research results, ideas, developments, and applications in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G, SDN and many others . We are mainly interested in receiving state of the art work on different aspect of future cyber security management system, security and privacy, cloud computing and big data supported security systems to mention but few.

The topics of interest for this workshop include, but are not limited to:

Cyber Security Techniques Architectures and Design
Cyber Security Systems
Cyber Security Techniques Integration
Cyber Security Techniques Orchestration
Cyber Security Techniques Based Network Control plane design
Cyber Security Techniques Based NetworkData plane design
Cyber Security Techniques Performance Management
Cyber Security Techniques for Cloud based DataCenter
Cyber Security Techniques for 5G Networks
Cyber Security Techniques for Internet of Things (IoT)
Cyber Security Techniques for Big Data Computing
Cyber Security Techniques for large scale storage system
Hardware system design for Cyber Security Techniques/li)
Cyber Security Techniques management
Radio Access Network virtualization
Cyber Security Techniques for programmable Networks
Cyber Security Techniques for Edge and Fog Computing
Cyber Security Techniques Cloud Computing
Cyber Security Techniques for Software Defined Network (SDN)
Cyber Security Techniques Network Function Virtualization (NFV)
Cyber Security Techniques Case studies

Submission Instructions

Papers selected for presentation will appear in the FMEC Proceedings, which will be published by the IEEE Computer Society and be submitted to IEEE Xplore for inclusion. Papers must be 6 pages in IEEE format, 10pt font using the IEEE 8.5" x 11" two-column format, single space, A4 format. All papers should be in PDF format, and submitted electronically at Paper Submission Link. A full paper must not exceed the stated length (including all figures, tables and references). Submitted papers must present original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines may be rejected without review. Also submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered. Authors may contact the Program Chair for further information or clarification. Papers should be submitted electronically by the deadline to https://easychair.org/conferences/?conf=fcst2018

Related Resources

SECITC 2018   11th International Conference on Security for Information Technology and Communications
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ETRIJ Cyber Security & AI 2019   ETRI Journal Special issue on Cyber Security and AI
Cyber Security Attacks and Defenses 2018   Workshop of Cyber Security Attacks and Defenses
CSITS 2018   International Workshop on Cyber Security for Intelligent Transportation Systems
ADCOM 2018   4th International conference on Advanced Computing
JUCS - ILT 2019   Journal of Universal Computer Science - Special Issue on Immersive Learning Technologies: Research and Future Directions
BDA4CID 2018   The 2nd International Workshop on Big Data Analytics for Cyber Intelligence and Defense, at IEEE Big Data 2018
ICCSP--Ei Compendex and Scopus 2019   2019 the 3rd International Conference on Cryptography, Security and Privacy (ICCSP 2019)--Ei Compendex and Scopus
BCT4MAS 2018   First International Workshop on Blockchain Technologies for Multi-Agent Systems