<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <br>
    <div class="moz-forward-container"><br>
      <div class="moz-forward-container">
        <div dir="ltr">
          <div class="gmail_default" style="color:#000000">
            <table class="gmail-MsoNormalTable" style="width:100%"
              width="100%" cellpadding="0" border="0">
              <tbody>
                <tr>
                  <td style="padding:0.75pt">
                    <p class="MsoNormal"
                      style="text-align:center;line-height:normal;margin:0in&#xA;
                      0in&#xA;
                      8pt;font-size:11pt;font-family:"Calibri",sans-serif"
                      align="center"><b><span
                          style="font-size:13.5pt;font-family:"Times&#xA;
                          New Roman",serif;color:rgb(0,0,64)">The
                          First International Symposium on Future Cyber
                          Security Technologies (FCST 2018) <span></span></span></b></p>
                    <p class="MsoNormal"
                      style="text-align:center;line-height:normal;margin:0in&#xA;
                      0in&#xA;
                      8pt;font-size:11pt;font-family:"Calibri",sans-serif"
                      align="center"><b><span
                          style="font-size:13.5pt;font-family:"Times&#xA;
                          New Roman",serif;color:rgb(0,0,64)"><a
                            href="http://emergingtechnet.org/FCST2018/"
                            moz-do-not-send="true">http://emergingtechnet.org/FCST2018/</a><span></span></span></b></p>
                    <p class="MsoNormal"
                      style="text-align:center;line-height:normal;margin:0in&#xA;
                      0in&#xA;
                      8pt;font-size:11pt;font-family:"Calibri",sans-serif"
                      align="center"><b><span
                          style="font-size:12pt;font-family:"Times&#xA;
                          New Roman",serif;color:rgb(0,0,64)">in
                          conjunction with</span></b><span
                        style="font-size:12pt;font-family:"Times
                        New&#xA; Roman",serif"><span></span></span></p>
                    <p class="MsoNormal"
                      style="text-align:center;line-height:normal;margin:0in&#xA;
                      0in&#xA;
                      8pt;font-size:11pt;font-family:"Calibri",sans-serif"
                      align="center"><a
                        href="http://emergingtechnet.org/IoTSMS2018/index.php"
                        style="color:blue;text-decoration:underline"
                        moz-do-not-send="true"><b><span
                            style="font-size:13.5pt;font-family:"Times&#xA;
                            New Roman",serif">The Fifth
                            International Conference on Internet of
                            Things: Systems, Management and Security
                            (IoTSMS 2018)</span></b></a><b><span
                          style="font-size:13.5pt;font-family:"Times&#xA;
                          New Roman",serif;color:rgb(0,0,64)"><br>
                          <br>
                          Valencia, Spain. October 15-18, 2018</span></b><span
                        style="font-size:12pt;font-family:"Times
                        New&#xA; Roman",serif"> <span></span></span></p>
                  </td>
                  <td style="padding:0.75pt">
                    <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span
                        style="font-size:12pt;font-family:"Times
                        New&#xA; Roman",serif">                <span></span></span></p>
                  </td>
                </tr>
              </tbody>
            </table>
            <p class="MsoNormal"
              style="text-align:justify;line-height:normal;margin:0in
              0in&#xA;8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                style="font-size:12pt;font-family:"Times New&#xA;
                Roman",serif">Hardware systems and Software
                applications continue to evolve with more
                functionalities, complex structures and interactions
                between them and with users. Cyber Security risks
                continue to evolve as well in both quantity in the same
                domains as well new types and ways on how to break into
                computing systems, software applications, websites,
                databases, programmable networks etc. For example,
                monitoring the car manufacturing industry, we can see
                that recent car models have more complex hardware
                components and automated programmable features in
                comparison with their earlier models, this will increase
                the risk associated with protecting such systems. Same
                thing can be applicable to most other engineering
                products. Such complex hardware and programmable
                techniques bring security opportunities to change the
                way cyber security controls (e.g. firewalls, Intrusion
                Detection Systems (IDS), etc.) are developed and
                enforced. They also bring security challenges related to
                our computing systems and software architectures or any
                changes that can be directly or indirectly related to
                them due to the complex interactions between them. The
                1st International Symposium on Future Cyber Security
                Technologies (FCST 2018) will focus on issues related to
                future cyber security challenges as well as
                opportunities which mainly highlight the above mentioned
                aspects. The 1st IEEE International Symposium on Future
                Cyber Security Technologies (FCST 2018) will be a forum
                for scientists, researchers, students, and practitioners
                to present their latest research results, ideas,
                developments, and applications in the areas of cyber
                security techniques, security challenges and
                opportunities for emerging technologies such as cloud
                computing, Internet of Things (IoT) and Edge Computing,
                big data, 5G, SDN and many others. We are mainly
                interested in receiving state of the art work on
                different aspect of future cyber security management
                system, security and privacy, cloud computing and big
                data supported security systems to mention but few.<span></span></span></p>
            <p class="MsoNormal" style="line-height:normal;margin:0in
              0in&#xA;8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif;color:rgb(0,0,64)">Topics of
                  interest </span></b><b><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif"><br>
                </span></b><span
                style="font-size:12pt;font-family:"Times New&#xA;
                Roman",serif">============== <br>
                Authors are encouraged to submit their original work,
                which is not submitted elsewhere, to this workshop. The
                topics of the workshop include but not limited to:<span></span></span></p>
            <ul style="margin-bottom:0in" type="disc">
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques
                  Architectures and Design<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Systems<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques
                  Integration<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques
                  Orchestration<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques Based
                  Network Control plane design<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques Based
                  Network Data plane design<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques
                  Performance Management<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for Cloud
                  based DataCenter<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for 5G
                  Networks<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for
                  Internet of Things (IoT)<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for Big
                  Data Computing<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for large
                  scale storage system<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Hardware system design for Cyber
                  Security Techniques/li><span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques
                  management<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Radio Access Network virtualization<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for
                  programmable Networks<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for Edge
                  and Fog Computing<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques Cloud
                  Computing<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques for
                  Software Defined Network (SDN)<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques Network
                  Function Virtualization (NFV)<span></span></span></li>
              <li class="MsoNormal"
                style="line-height:normal;margin:0in&#xA; 0in&#xA;
                8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Cyber Security Techniques Case
                  studies<span></span></span></li>
            </ul>
            <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif;color:rgb(0,0,64)">Paper Submission
                  : </span></b><a name="_submission"
                moz-do-not-send="true"><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif"><br>
                  =============<span></span></span></a></p>
            <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Authors are requested to submit
                  papers reporting original research results and
                  experience. The page limit for full papers is 6 pages.
                  Papers should be prepared using IEEE two-column
                  template. <span></span></span></span></p>
            <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif"><span> </span></span></span></p>
            <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">IEEE Computer Society Proceedings
                  Author Guidelines are available at: </span></span><a
href="http://www.computer.org/portal/web/cscps/submission"
                style="color:blue;text-decoration:underline"
                moz-do-not-send="true"><span><span
                    style="font-size:12pt;font-family:"Times
                    New&#xA; Roman",serif">IEEE Guidelines Link</span></span></a><span><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif"> <span></span></span></span></p>
            <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif">Papers should be submitted as PDF
                  files via the EasyChair: </span></span><a
                href="https://easychair.org/conferences/?conf=anlp2018"
                style="color:blue;text-decoration:underline"
                moz-do-not-send="true"><span><span
                    style="font-size:12pt;font-family:"Times
                    New&#xA; Roman",serif">EasyChair Link</span></span></a><span></span><span
                style="font-size:12pt;font-family:"Times New&#xA;
                Roman",serif"> <span></span></span></p>
            <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span
                style="font-size:12pt;font-family:"Times New&#xA;
                Roman",serif">Submitted research papers may not
                overlap with papers that have already been published or
                that are simultaneously submitted to a journal or a
                conference. All papers accepted for this conference are
                peer-reviewed and are to be published in the IoTSMS
                conference proceedings and will be submitted for
                inclusion in IEEE Xplore Digital Library. <span></span></span></p>
            <p class="MsoNormal" style="margin:0in
0in&#xA;0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif;color:rgb(0,0,64)">Important Dates :
                </span></b><a name="_dates" moz-do-not-send="true"></a><span
                style="font-size:12pt;font-family:"Times New&#xA;
                Roman",serif"><br>
                =============<span></span></span></p>
            <p class="MsoNormal" style="line-height:normal;margin:0in
              0in&#xA;8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif;color:red">Full Paper Submission:</span></b><b><span
                  style="font-size:12pt;font-family:"Times New&#xA;
                  Roman",serif;color:red">  July 31, 2018</span></b><span
                style="font-size:12pt;font-family:"Times New&#xA;
                Roman",serif;color:red"> </span><span
                style="font-size:12pt;font-family:"Times New&#xA;
                Roman",serif"><br>
                <span>Notification of Decision:</span>  August 25th,
                2018<br>
                <span>Camera-Ready and Registration :</span> September
                5th, 2018<span></span></span></p>
            <p class="MsoNormal" style="margin:0in
0in&#xA;8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span
style="font-size:12pt;line-height:107%;font-family:"Times New&#xA;
                Roman",serif">All questions about submissions
                should be emailed to: <a
                  href="mailto:emergingtechnetwork@gmail.com"
                  moz-do-not-send="true">emergingtechnetwork@gmail.com</a><span></span></span></p>
            <br clear="all">
          </div>
        </div>
      </div>
    </div>
  </body>
</html>