<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body>
<p> </p>
<div class="moz-text-html" lang="x-unicode">
<div class="moz-text-html" lang="x-unicode"><br>
</div>
<div class="moz-text-html" lang="x-unicode"><font size="-2">--------------------------------------------------------------------------------------------------
<br>
Apologies for cross posting. Please feel free to contribute
and to forward. <br>
--------------------------------------------------------------------------------------------------
</font>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">CALL FOR PAPERS</span></p>
<b> </b>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt" align="center"><b><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span></b><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">International Workshop on Artificial
Intelligence and Security Challenges in Emerging Networks
(AISCEN 2020)</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family:"Times New
Roman"; mso-fareast-language:FR"> <a href="https://sites.google.com/view/aiscen2019"><span style="mso-ansi-language:EN-US" lang="EN-US">https://sites.google.com/view/aiscen2020</span></a></span><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> to be held in conjunction with the 11th
International Conference on Emerging Ubiquitous Systems and
Pervasive Networks (EUSPN).</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> November 2-5, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Madeira, Portugal</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">The recent rise of emerging networking
technologies such as social networks, content centric
networks, IoT networks, etc. have attracted lots of
attention from academia as well as industry. In fact, the
attractiveness of such networks leads to the increase of
security risks in particularly privacy and security threats.
Besides, recent years have seen a dramatic increase in
applications of artificial intelligence (AI), machine
learning, and data mining to security and privacy problems.</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">The purpose of this workshop is to disseminate
cutting-edge research results, highlight research challenges
and open issues, and promotes further research interest and
activities in both security and artificial intelligence in
emerging networking technologies.</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Moreover, does this workshop welcome
submissions that evaluate existing research results by
reproducing experiments.</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">INSTRUCTIONS FOR AUTHORS<br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Topics of interest include, but are not limited
to following topics:</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">1. Social intelligence/ Artificial Intelligence</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">2. AI for routing protocols</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">3. Spam detection</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">4. Phishing detection and prevention</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">5. Botnet detection</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">6. Intrusion detection and response</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">7. Secure multiparty computation and
cryptographic approaches</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">8. Privacy-preserving data mining</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">9. AI approaches to trust and reputation</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">10. Vulnerability testing through intelligent
probing (e.g. fuzzing)</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">11. Content-driven security policy management
& access control</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">12. Techniques and methods for generating
training and test sets</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">13. Anomalous behavior detection (e.g. fraud
prevention, authentication)</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span><br>
<span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">SUBMISSION SITE</span><u><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></u></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><a href="https://easychair.org/conferences/?conf=aiscen2020" target="_blank">https://easychair.org/conferences/?conf=aiscen2020</a><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">IMPORTANT DATES<br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Papers Submission Due: June 15, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Authors Notifications: August 2, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Final Manuscript Due: August 30, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">EUSPN 2020: November 2,
2020 – November 5, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">WORKSHOP CHAIR</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt
320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt
641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Dr Ryma Abassi (<a class="moz-txt-link-abbreviated" href="mailto:ryma.abassi@supcom.tn">ryma.abassi@supcom.tn</a>)<br>
</span></p>
<br>
<span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"></span><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family:"Times New Roman";
mso-ansi-language:EN-US;mso-fareast-language:FR"><span lang="EN-US"></span></span> ------------------------<br>
<div>
<p><font size="-1" face="Courier New">Dr Ryma Abassi<br>
</font></p>
<font size="-1"> </font></div>
<font size="-1"> </font>
<div>
<p><font size="-1" face="Courier New">Digital Security Reseach
Lab, SUPCOM</font></p>
</div>
<font size="-1"> </font>
<div><font size="-1"> </font>
<p><font size="-1" face="Courier New">University of Carthage,
Tunisia</font></p>
</div>
<div>
<p><br>
</p>
<div class="adL"><br>
</div>
</div>
</div>
</div>
</body>
</html>