<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body>
    <div class="moz-text-html" lang="x-unicode"><br>
    </div>
    <div class="moz-text-html" lang="x-unicode"><font size="-2">--------------------------------------------------------------------------------------------------
        <br>
        Apologies for cross posting. Please feel free to contribute and
        to forward.
        <br>
--------------------------------------------------------------------------------------------------
      </font>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">CALL FOR PAPERS</span></p>
      <b> </b>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt" align="center"><b><span style="font-size:10.0pt;font-family:"Courier
            New";mso-fareast-font-family: "Times New
            Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span></b><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">International Workshop on Artificial Intelligence
          and Security Challenges in Emerging Networks (AISCEN 2020)</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family:"Times New Roman";
          mso-fareast-language:FR"> <a href="https://sites.google.com/view/aiscen2019"><span style="mso-ansi-language:EN-US" lang="EN-US">https://sites.google.com/view/aiscen2020</span></a></span><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"></span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> to be held in conjunction with the 11th
          International Conference on Emerging Ubiquitous Systems and
          Pervasive Networks (EUSPN).</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> November 2-5, 2020</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Madeira, Portugal</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
        </span></p>
      <span style="font-size:10.0pt;font-family:"Courier
        New";mso-fareast-font-family: "Times New
        Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">The recent rise of emerging networking
          technologies such as social networks, content centric
          networks, IoT networks, etc. have attracted lots of attention
          from academia as well as industry. In fact, the attractiveness
          of such networks leads to the increase of security risks in
          particularly privacy and security threats. Besides, recent
          years have seen a dramatic increase in applications of
          artificial intelligence (AI), machine learning, and data
          mining to security and privacy problems.</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">The purpose of this workshop is to disseminate
          cutting-edge research results, highlight research challenges
          and open issues, and promotes further research interest and
          activities in both security and artificial intelligence in
          emerging networking technologies.</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Moreover, does this workshop welcome submissions
          that evaluate existing research results by reproducing
          experiments.</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
        </span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">INSTRUCTIONS FOR AUTHORS<br>
        </span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Topics of interest include, but are not limited
          to following topics:</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">1. Social intelligence/ Artificial Intelligence</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">2. AI for routing protocols</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">3. Spam detection</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">4. Phishing detection and prevention</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">5. Botnet detection</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">6. Intrusion detection and response</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">7. Secure multiparty computation and
          cryptographic approaches</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">8. Privacy-preserving data mining</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">9. AI approaches to trust and reputation</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">10. Vulnerability testing through intelligent
          probing (e.g. fuzzing)</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">11. Content-driven security policy management
          &amp; access control</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">12. Techniques and methods for generating
          training and test sets</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">13. Anomalous behavior detection (e.g. fraud
          prevention, authentication)</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span><br>
        <span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">SUBMISSION SITE</span><u><span style="font-size:10.0pt;font-family:"Courier
            New";mso-fareast-font-family: "Times New
            Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
          </span></u></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><a href="https://easychair.org/conferences/?conf=aiscen2020" target="_blank">https://easychair.org/conferences/?conf=aiscen2020</a><br>
        </span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
        </span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">IMPORTANT DATES<br>
        </span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Papers Submission Due:  June 15, 2020</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Authors Notifications:      August 2, 2020</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Final Manuscript Due:      August 30, 2020</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">EUSPN 2020:                      November 2, 2020
          – November 5, 2020</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
        </span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">WORKSHOP CHAIR</span></p>
      <p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
        normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
        320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt
        687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
          New";mso-fareast-font-family: "Times New
          Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Dr Ryma Abassi (<a class="moz-txt-link-abbreviated" href="mailto:ryma.abassi@supcom.tn">ryma.abassi@supcom.tn</a>)<br>
        </span></p>
      <br>
      <span style="font-size:10.0pt;font-family:"Courier
        New";mso-fareast-font-family: "Times New
        Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"></span><span style="font-size:10.0pt;font-family:"Courier
        New";mso-fareast-font-family:"Times New Roman";
        mso-ansi-language:EN-US;mso-fareast-language:FR"><span lang="EN-US"></span></span> ------------------------<br>
      <div>
        <p><font size="-1" face="Courier New">Dr Ryma Abassi<br>
          </font></p>
        <font size="-1"> </font></div>
      <font size="-1"> </font>
      <div>
        <p><font size="-1" face="Courier New">Digital Security Reseach
            Lab, SUPCOM</font></p>
      </div>
      <font size="-1"> </font>
      <div><font size="-1"> </font>
        <p><font size="-1" face="Courier New">University of Carthage,
            Tunisia</font></p>
      </div>
      <div>
        <p><br>
        </p>
        <div class="adL"><br>
        </div>
      </div>
    </div>
  </body>
</html>