<div dir="ltr">
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif">[Apologies
if you got multiple copies of this invitation]<span></span></span></p>
<table class="m_3719145539479686833m_-688714918427105692gmail-MsoNormalTable" style="width:100%" width="100%" cellpadding="0" border="0">
<tbody><tr>
<td style="padding:0.75pt">
<p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)"><span> </span></span></b></p>
<p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">The 2nd IEEE International Symposium
on Future Cyber Security Technologies (FCST 2019)<span></span></span></b></p>
<p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><span lang="EN-GB"><a href="http://emergingtechnet.org/FCST2019/" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><b><span style="font-size:16pt;font-family:"Times New Roman",serif" lang="EN-US">http://emergingtechnet.org/FCST2019/</span></b></a></span><b><span style="font-size:16pt;font-family:"Times New Roman",serif"><span></span></span></b></p>
<p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">in conjunction with</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p>
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><u><span style="font-size:13.5pt;line-height:107%;font-family:"Times New Roman",serif;color:rgb(41,145,214)">The Sixth International Conference on Internet of Things: Systems,
Management and Security (IoTSMS 2019)<span></span></span></u></b></p>
<p class="MsoNormal" style="text-align:center;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Granada, Spain. October 22-25, 2019</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif"> <span></span></span></p>
</td>
<td style="padding:0.75pt">
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"> <span></span></span></p>
</td>
</tr>
</tbody></table>
<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><u><span style="font-size:12pt" lang="EN-GB">Call for Papers:<span></span></span></u></p>
<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Hardware systems and Software applications continue to
evolve with more functionalities, complex structures and interactions between
them and with users. Cyber Security risks continue to evolve as well in both
quantities in the same domains as well new types and ways on how to break into
computing systems, software applications, websites, databases, programmable
networks etc. For example, monitoring the car manufacturing industry, we can
see that recent car models have more complex hardware components and automated
programmable features in comparison with their earlier models, this will
increase the risk associated with protecting such systems. Same thing can be
applicable to most other engineering products. Such complex hardware and
programmable techniques bring security opportunities to change the way cyber
security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are
developed and enforced. They also bring security challenges related to our
computing systems and software architectures or any changes that can be
directly or indirectly related to them due to the complex interactions between
them. The 2nd International Symposium on Future Cyber Security Technologies
(FCST 2019) will focus on issues related to future cyber security challenges as
well as opportunities which mainly highlight the above mentioned aspects.<span></span></span></p>
<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">The 2nd IEEE International Symposium on Future Cyber
Security Technologies (FCST 2019) will be a forum for scientists, researchers,
students, and practitioners to present their latest research results, ideas,
developments, and applications in the areas of cyber security techniques,
security challenges and opportunities for emerging technologies such as cloud
computing, Internet of Things (IoT) and Edge Computing, big data, 5G, SDN and
many others. We are mainly interested in receiving state of the art work on
different aspect of future cyber security management system, security and
privacy, cloud computing and big data supported security systems to mention but
few.<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Topics
of interest </span></b><b><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif">==============
<br>
Authors are encouraged to submit their original work, which is not submitted
elsewhere, to this workshop. The topics of the workshop include but not limited
to:<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques Architectures and Design <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Systems <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques Integration <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques Orchestration <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques Based Network Control plane design <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques Based NetworkData plane design <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques Performance Management <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques for Cloud based DataCenter <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques for 5G Networks <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques for Big Data
Computing <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques for large scale
storage system <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Hardware system design for Cyber Security
Techniques/li> <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques management <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Radio Access Network virtualization <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques for programmable
Networks <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques for Edge and Fog
Computing <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques Cloud Computing <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques for Software
Defined Network (SDN) <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques Network Function
Virtualization (NFV) <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques Case studies<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span>Cyber Security Techniques for Internet of
Things (IoT)<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Paper
Submission : </span></b><a name="m_3719145539479686833_m_-688714918427105692__submission"><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
=============<span></span></span></a></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:12pt;font-family:"Times New Roman",serif">Authors are requested to submit
papers reporting original research results and experience. The page limit for
full papers is 6 pages. Papers should be prepared using IEEE two-column
template. <span></span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:12pt;font-family:"Times New Roman",serif">IEEE Computer Society Proceedings
Author Guidelines are available at: </span></span><a href="http://www.computer.org/portal/web/cscps/submission" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:blue">IEEE Guidelines Link</span></span></a><span><span style="font-size:12pt;font-family:"Times New Roman",serif"> <span></span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:12pt;font-family:"Times New Roman",serif">Papers should be submitted as PDF
files via the EasyChair</span></span><span style="font-size:12pt;font-family:"Times New Roman",serif">.<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Submitted
research papers may not overlap with papers that have already been published or
that are simultaneously submitted to a journal or a conference. All papers
accepted for this conference are peer-reviewed and are to be published in the
conference proceedings and will be submitted for inclusion into the IEEE Xplore
Digital Library. <span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(0,0,64)">Important
Dates : </span></b><a name="m_3719145539479686833_m_-688714918427105692__dates"></a><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
=============<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:red">Full
Paper Submission:</span></b><span style="font-size:12pt;font-family:"Times New Roman",serif;color:red">
22 July, 2019 </span><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
<b>Notification of Decision:</b> 20 August, 2019<br>
<b>Camera-Ready and Registration :</b> 5th September, 2019<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> </span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span lang="EN-GB">Please send any inquiry to the Emerging
Tech. Network Team at: <a href="mailto:emergingtechnetwork@gmail.com" style="color:rgb(5,99,193);text-decoration:underline" target="_blank">emergingtechnetwork@gmail.com</a></span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p>
</div>