<div dir="ltr">





















<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif">[Apologies
if you got multiple copies of this invitation]<span></span></span></p>

<table class="m_8244554247275112282gmail-m_6324114980058698020gmail-MsoNormalTable" style="width:100%" width="100%" cellpadding="0" border="0">
 <tbody><tr>
  <td style="padding:0.75pt">
  <p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)"><span></span></span></b></p>
  <p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">The 2nd IEEE International Symposium
  on Future Cyber Security Technologies (FCST 2019)<span></span></span></b></p>
  <p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:16pt;font-family:"Times New Roman",serif"><a href="http://emergingtechnet.org/FCST2019/" style="color:rgb(5,99,193);text-decoration:underline" target="_blank">http://emergingtechnet.org/FCST2019/</a><span></span></span></b></p>
  <p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">in conjunction with</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p>
  <p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><u><span style="font-size:13.5pt;line-height:107%;font-family:"Times New Roman",serif;color:rgb(41,145,214)">The Sixth International Conference on Internet of Things: Systems,
  Management and Security (IoTSMS 2019)<span></span></span></u></b></p>
  <p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Granada, Spain. October 22-25, 2019</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif"> <span></span></span></p>
  </td>
  <td style="padding:0.75pt">
  <p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">                <span></span></span></p>
  </td>
 </tr>
</tbody></table>

<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><u><span style="font-size:12pt" lang="EN-GB">Call for Papers:<span></span></span></u></p>

<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Hardware systems and Software applications continue to
evolve with more functionalities, complex structures and interactions between
them and with users. Cyber Security risks continue to evolve as well in both quantities
in the same domains as well new types and ways on how to break into computing
systems, software applications, websites, databases, programmable networks etc.
For example, monitoring the car manufacturing industry, we can see that recent
car models have more complex hardware components and automated programmable
features in comparison with their earlier models, this will increase the risk
associated with protecting such systems. Same thing can be applicable to most
other engineering products. Such complex hardware and programmable techniques
bring security opportunities to change the way cyber security controls (e.g.
firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced.
They also bring security challenges related to our computing systems and
software architectures or any changes that can be directly or indirectly
related to them due to the complex interactions between them. The 2nd
International Symposium on Future Cyber Security Technologies (FCST 2019) will
focus on issues related to future cyber security challenges as well as
opportunities which mainly highlight the above mentioned aspects.<span></span></span></p>

<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">The 2nd IEEE International Symposium on Future Cyber
Security Technologies (FCST 2019) will be a forum for scientists, researchers,
students, and practitioners to present their latest research results, ideas,
developments, and applications in the areas of cyber security techniques,
security challenges and opportunities for emerging technologies such as cloud
computing, Internet of Things (IoT) and Edge Computing, big data, 5G, SDN and
many others. We are mainly interested in receiving state of the art work on
different aspect of future cyber security management system, security and
privacy, cloud computing and big data supported security systems to mention but
few.<span></span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Topics
of interest </span></b><b><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif">==============
<br>
Authors are encouraged to submit their original work, which is not submitted
elsewhere, to this workshop. The topics of the workshop include but not limited
to:<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques Architectures and Design <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Systems <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques Integration <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques Orchestration <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques Based Network Control plane design <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques Based NetworkData plane design <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques Performance Management <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques for Cloud based DataCenter <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security
Techniques for 5G Networks <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques for Big Data
Computing <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques for large scale
storage system <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Hardware system design for Cyber Security
Techniques/li> <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques management <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Radio Access Network virtualization <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques for programmable
Networks <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques for Edge and Fog
Computing <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques Cloud Computing <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques for Software
Defined Network (SDN) <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques Network Function
Virtualization (NFV) <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques Case studies<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques for Internet of
Things (IoT)<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Paper
Submission : </span></b><a name="m_8244554247275112282_m_6324114980058698020__submission"><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
=============<span></span></span></a></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:12pt;font-family:"Times New Roman",serif">Authors are requested to submit
papers reporting original research results and experience. The page limit for
full papers is 6 pages. Papers should be prepared using IEEE two-column
template. <span></span></span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:12pt;font-family:"Times New Roman",serif">IEEE Computer Society Proceedings
Author Guidelines are available at: </span></span><a href="http://www.computer.org/portal/web/cscps/submission" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:blue">IEEE Guidelines Link</span></span></a><span><span style="font-size:12pt;font-family:"Times New Roman",serif"> <span></span></span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:12pt;font-family:"Times New Roman",serif">Papers should be submitted as PDF
files via the EasyChair</span></span><span style="font-size:12pt;font-family:"Times New Roman",serif">.<span></span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Submitted
research papers may not overlap with papers that have already been published or
that are simultaneously submitted to a journal or a conference. All papers
accepted for this conference are peer-reviewed and are to be published in the
conference proceedings and will be submitted for inclusion into the IEEE Xplore
Digital Library. <span></span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Important
Dates : </span></b><a name="m_8244554247275112282_m_6324114980058698020__dates"></a><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
=============<span></span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif">Full Paper
Submission:</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif">  1
July, 2019 <br>
<b>Notification of Decision:</b>  20 August, 2019<br>
<b>Camera-Ready and Registration :</b> 5th September, 2019<span></span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span lang="EN-GB">Please send any inquiry to the Emerging Tech.
Network Team at: <a href="mailto:emergingtechnetwork@gmail.com" style="color:rgb(5,99,193);text-decoration:underline" target="_blank">emergingtechnetwork@gmail.com</a></span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p>









</div>