<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<br>
<div class="moz-forward-container">
<div class="moz-forward-container">
<div dir="ltr">
<div style="color:rgb(0,0,0)" class="gmail_default">
<table class="gmail-MsoNormalTable" style="width:100%"
width="100%" cellpadding="0" border="0">
<tbody>
<tr>
<td style="padding:0.75pt">
<p class="MsoNormal"
style="text-align:center;line-height:normal;margin:0in

0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"
align="center"><b><span
style="font-size:13.5pt;font-family:"Times

New Roman",serif;color:rgb(0,0,64)">The
First International Symposium on Future Cyber
Security Technologies (FCST 2018) <span></span></span></b></p>
<p class="MsoNormal"
style="text-align:center;line-height:normal;margin:0in

0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"
align="center"><b><span
style="font-size:13.5pt;font-family:"Times

New Roman",serif;color:rgb(0,0,64)"><a
href="http://emergingtechnet.org/FCST2018/"
moz-do-not-send="true">http://emergingtechnet.org/FCST2018/</a><span></span></span></b></p>
<p class="MsoNormal"
style="text-align:center;line-height:normal;margin:0in

0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"
align="center"><b><span
style="font-size:12pt;font-family:"Times

New Roman",serif;color:rgb(0,0,64)">in
conjunction with</span></b><span
style="font-size:12pt;font-family:"Times
New
 Roman",serif"><span></span></span></p>
<p class="MsoNormal"
style="text-align:center;line-height:normal;margin:0in

0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"
align="center"><a
href="http://emergingtechnet.org/IoTSMS2018/index.php"
style="color:blue;text-decoration:underline"
moz-do-not-send="true"><b><span
style="font-size:13.5pt;font-family:"Times

New Roman",serif">The Fifth
International Conference on Internet of
Things: Systems, Management and Security
(IoTSMS 2018)</span></b></a><b><span
style="font-size:13.5pt;font-family:"Times

New Roman",serif;color:rgb(0,0,64)"><br>
<br>
Valencia, Spain. October 15-18, 2018</span></b><span
style="font-size:12pt;font-family:"Times
New
 Roman",serif"> <span></span></span></p>
</td>
<td style="padding:0.75pt">
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times
New
 Roman",serif"> <span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p class="MsoNormal"
style="text-align:justify;line-height:normal;margin:0in
0in
8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Hardware systems and Software
applications continue to evolve with more
functionalities, complex structures and interactions
between them and with users. Cyber Security risks
continue to evolve as well in both quantity in the same
domains as well new types and ways on how to break into
computing systems, software applications, websites,
databases, programmable networks etc. For example,
monitoring the car manufacturing industry, we can see
that recent car models have more complex hardware
components and automated programmable features in
comparison with their earlier models, this will increase
the risk associated with protecting such systems. Same
thing can be applicable to most other engineering
products. Such complex hardware and programmable
techniques bring security opportunities to change the
way cyber security controls (e.g. firewalls, Intrusion
Detection Systems (IDS), etc.) are developed and
enforced. They also bring security challenges related to
our computing systems and software architectures or any
changes that can be directly or indirectly related to
them due to the complex interactions between them. The
1st International Symposium on Future Cyber Security
Technologies (FCST 2018) will focus on issues related to
future cyber security challenges as well as
opportunities which mainly highlight the above mentioned
aspects. The 1st IEEE International Symposium on Future
Cyber Security Technologies (FCST 2018) will be a forum
for scientists, researchers, students, and practitioners
to present their latest research results, ideas,
developments, and applications in the areas of cyber
security techniques, security challenges and
opportunities for emerging technologies such as cloud
computing, Internet of Things (IoT) and Edge Computing,
big data, 5G, SDN and many others. We are mainly
interested in receiving state of the art work on
different aspect of future cyber security management
system, security and privacy, cloud computing and big
data supported security systems to mention but few.<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in
0in
8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
style="font-size:12pt;font-family:"Times New

Roman",serif;color:rgb(0,0,64)">Topics of
interest </span></b><b><span
style="font-size:12pt;font-family:"Times New

Roman",serif"><br>
</span></b><span
style="font-size:12pt;font-family:"Times New

Roman",serif">============== <br>
Authors are encouraged to submit their original work,
which is not submitted elsewhere, to this workshop. The
topics of the workshop include but not limited to:<span></span></span></p>
<ul style="margin-bottom:0in" type="disc">
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif"><span> </span>Cyber Security
Techniques Architectures and Design<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Systems<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques
Integration<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques
Orchestration<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques Based
Network Control plane design<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques Based
NetworkData plane design<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques
Performance Management<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for Cloud
based DataCenter<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for 5G
Networks<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for
Internet of Things (IoT)<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for Big
Data Computing<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for large
scale storage system<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Hardware system design for Cyber
Security Techniques/li><span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques
management<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Radio Access Network virtualization<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for
programmable Networks<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for Edge
and Fog Computing<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques Cloud
Computing<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques for
Software Defined Network (SDN)<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques Network
Function Virtualization (NFV)<span></span></span></li>
<li class="MsoNormal"
style="line-height:normal;margin:0in
 0in

8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Cyber Security Techniques Case
studies<span></span></span></li>
</ul>
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
style="font-size:12pt;font-family:"Times New

Roman",serif;color:rgb(0,0,64)">Paper Submission
: </span></b><a name="_submission"
moz-do-not-send="true"><span
style="font-size:12pt;font-family:"Times New

Roman",serif"><br>
=============<span></span></span></a></p>
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Authors are requested to submit
papers reporting original research results and
experience. The page limit for full papers is 6 pages.
Papers should be prepared using IEEE two-column
template. <span></span></span></span></p>
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
style="font-size:12pt;font-family:"Times New

Roman",serif"><span> </span></span></span></p>
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
style="font-size:12pt;font-family:"Times New

Roman",serif">IEEE Computer Society Proceedings
Author Guidelines are available at: </span></span><a
href="http://www.computer.org/portal/web/cscps/submission"
style="color:blue;text-decoration:underline"
moz-do-not-send="true"><span><span
style="font-size:12pt;font-family:"Times
New
 Roman",serif">IEEE Guidelines Link</span></span></a><span><span
style="font-size:12pt;font-family:"Times New

Roman",serif"> <span></span></span></span></p>
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Papers should be submitted as PDF
files via the EasyChair: </span></span><a
href="https://easychair.org/conferences/?conf=anlp2018"
style="color:blue;text-decoration:underline"
moz-do-not-send="true"><span><span
style="font-size:12pt;font-family:"Times
New
 Roman",serif">EasyChair Link</span></span></a><span></span><span
style="font-size:12pt;font-family:"Times New

Roman",serif"> <span></span></span></p>
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Submitted research papers may not
overlap with papers that have already been published or
that are simultaneously submitted to a journal or a
conference. All papers accepted for this conference are
peer-reviewed and are to be published in the IoTSMS
conference proceedings and will be submitted for
inclusion in IEEE Xplore Digital Library. <span></span></span></p>
<p class="MsoNormal" style="margin:0in
0in
0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
style="font-size:12pt;font-family:"Times New

Roman",serif;color:rgb(0,0,64)">Important Dates :
</span></b><a name="_dates" moz-do-not-send="true"></a><span
style="font-size:12pt;font-family:"Times New

Roman",serif"><br>
=============<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in
0in
8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
style="font-size:12pt;font-family:"Times New

Roman",serif">Full Paper Submission:</span></b><span
style="font-size:12pt;font-family:"Times New

Roman",serif"> July 15, 2018 <br>
<b>Notification of Decision:</b> August 25th, 2018<br>
<b>Camera-Ready and Registration :</b> September 5th,
2018<span></span></span></p>
<p class="MsoNormal" style="margin:0in
0in
8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;line-height:107%;font-family:"Times New

Roman",serif">All questions about submissions
should be emailed to: <a
href="mailto:emergingtechnetwork@gmail.com"
moz-do-not-send="true">emergingtechnetwork@gmail.com</a><span></span></span></p>
</div>
<br>
</div>
</div>
</div>
</body>
</html>