<div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div class="gmail_quote"><div dir="ltr"><div style="font-family:arial,helvetica,sans-serif"><p class="MsoNormal" align="center" style="margin:0cm 0cm 0.0001pt 0.5pt;text-align:center;line-height:107%;font-size:12pt;font-family:Arial,sans-serif;color:black"><b><span lang="EN-CA" style="font-family:"Times New Roman",serif"><br>Journal of Network and
Systems Management - Springer</span></b><span lang="EN-CA" style="font-family:"Times New Roman",serif"></span></p>

<p class="MsoNormal" align="center" style="margin:0cm 0cm 0.0001pt 0.5pt;text-align:center;line-height:107%;font-size:12pt;font-family:Arial,sans-serif;color:black"><b><span lang="EN-CA" style="font-family:"Times New Roman",serif">Special issue on</span></b><span lang="EN-CA" style="font-family:"Times New Roman",serif"></span></p>

<p class="MsoNormal" align="center" style="margin:0cm 0cm 0.0001pt 0.5pt;text-align:center;line-height:107%;font-size:12pt;font-family:Arial,sans-serif;color:black"><b><span lang="EN-CA" style="font-family:"Times New Roman",serif;color:red">Cybersecurity
Management in the era of AI</span></b><span lang="EN-CA" style="font-family:"Times New Roman",serif;color:red"></span></p><p class="MsoNormal" align="center" style="margin:0cm 0cm 0.0001pt 0.5pt;text-align:center;line-height:107%;font-size:12pt;font-family:Arial,sans-serif;color:black"><a href="https://www.springer.com/journal/10922/updates/17974838" target="_blank">https://www.springer.com/journal/10922/updates/17974838</a> <b><span lang="EN-CA" style="font-family:"Times New Roman",serif;color:red"><br></span></b></p>

<p class="MsoNormal" align="center" style="margin:0cm 0cm 11.9pt 0.5pt;text-align:center;line-height:107%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:"Times New Roman",serif">***Submissions due:<b> October 31st, 2020</b>***</span></p>

<p class="MsoNormal" align="center" style="margin:0cm 0cm 11.5pt 1.7pt;text-align:center;text-indent:0cm;line-height:107%;font-size:12pt;font-family:Arial,sans-serif;color:black"><u><span lang="EN-CA" style="font-family:"Times New Roman",serif">We encourage early submission,
please check the open submission schedule policy below.</span></u><span lang="EN-CA" style="font-family:"Times New Roman",serif"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 11.5pt;text-indent:0cm;line-height:107%;text-align:justify;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:Calibri,sans-serif;color:rgb(51,51,51);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Fifth Generation (5G) and beyond cellular networks have
revolutionized the communication architecture, providing connectivity for
people, things, data, applications, transport, and cities in smart networked
environments, at faster data rates, reduced latencies, and acceptable costs.
The massive number and volume of heterogonous connected devices in such an open
space, as well as the advancements in human computer interaction (HCI), artificial
intelligence (AI), computing and communication technologies have led to an increasing
number of personal and ubiquitous intelligent systems. Such a wide deployment
of connected smart technologies introduces new challenges to system security
and privacy, mainly for Cyber-physical Systems.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 11.5pt;text-indent:0cm;line-height:107%;text-align:justify;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:Calibri,sans-serif;color:rgb(51,51,51);background-image:initial;background-position:initial;background-size:initial;background-repeat:initial;background-origin:initial;background-clip:initial">Cyberphysical is a term used for the integration of physical
and computing domains as seen in many different areas such as medical,
automotive, energy and other critical systems. Nowadays, cyberphysical systems are
highly prone to cyber attacks and other forms of security threats at the communication
layer due to system high connectivity characteristics. Some of today’s emerging
security threats are hard to detect using traditional security and privacy
measures and techniques. Therefore, innovative security methods and privacy
protection solutions are needed to provide more secure and robust
privacy-preserving intelligent cyber-physical systems. To achieve this, <b>cybersecurity
management systems </b>need to adapt to the changing cyber security threats
autonomously with minimal user intervention to provide maximum protection
against cyber attacks, intrusions, malware and various types of data breaches. AI
has the potential to be leveraged in different aspects of cybersecurity and cyberthreat
detection. It has received significant interest lately, where a plethora of AI
and other intelligent learning solutions such as deep and reinforcement
learning are now being integrated into cybersecurity systems to provide more
secure and robust privacy-preserving solutions for personal and ubiquitous
systems. Such integration will play a vital role in providing enhanced security
for intelligent autonomous systems and enables organizations to make crucial
changes to their security landscape.</span></p>

<p class="MsoNormal" style="text-indent:0cm;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:Calibri,sans-serif">This Special Issue invites theoretical and applied cutting edge
research on standards, frameworks, models, and approaches on cybersecurity management
in the era of AI and intelligent learning technologies. More specifically, we encourage
original paper submissions on the most recent advances in security network and
system management solutions using AI. The Special Issue also welcomes
contributions from the industry perspective. Topics of interest include, but they
are not limited to: </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Cybersecurity
management in cyber-physical systems using AI;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Security,
privacy, and trust issues in cyber-physical systems;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Blockchain-enabled
cyber-physical systems;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Utilizing AI
technologies for cyber investigation and threat intelligence;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">The
integration of AI and Blockchain for security critical infrastructures;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Design,
optimization and modeling of cybersecurity management systems;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">AI and ML for
intrusion detection/prevention in sensitive environments;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Advanced AI
techniques to secure future Internet architectures/protocols;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Trust
management in cyber-physical networks and systems;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Privacy
management at edge of the network using machine learning;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Trustworthy data
collection and processing</span><span lang="EN-CA" style="font-family:Calibri,sans-serif"> using intelligent learning
techniques;</span><span lang="EN-CA" style="font-family:Calibri,sans-serif"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Cybersecurity
management of big data;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">AI-based cybersecurity
techniques for IoT, IoE, IoH, and IoV;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Cybersecurity
of connected and autonomous vehicles;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Cybersecurity
and AI for digital twin;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Management
framework for intelligent secure networking.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Cybersecurity
management to protect organizations’ sensitive data using intelligent learning
techniques;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">AI-enabled
digital investigation;</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 0.5pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:Calibri,sans-serif"> </span></p>

<h1 style="text-align:justify;line-height:107%;break-after:avoid;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:Calibri,sans-serif">Planned
Schedule </span></h1>

<p class="MsoNormal" style="text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><u><span lang="EN-CA" style="font-family:Calibri,sans-serif">Open-submission
schedule:</span></u><span lang="EN-CA" style="font-family:Calibri,sans-serif"> in this special issue, we implement an “open” submission
approach, where we do not have a submission time period. Interested authors can
submit the paper any time before the fixed deadline, and the review process
will begin right after the paper submission, i.e., in a first-in first-serve
fashion. The submission schedule is: </span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Manuscript
due: <b>October 31st, 2020.</b></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Revision
notification: within <b>two</b> months after the submission.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Revised paper
due: within <b>one</b> month after the revision notification.</span></p>

<p class="MsoNormal" style="margin:0cm 0cm 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Final
notification: <b>one</b> month after the revised paper notification</span><span lang="EN-CA" style="font-family:Calibri,sans-serif">.</span><span lang="EN-CA" style="font-family:Calibri,sans-serif"></span></p>

<p class="MsoNormal" style="margin:0cm 0cm 10.75pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:"Times New Roman",serif">-<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">         
</span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Expected
Publication of the Special Issue: <b>Second Quarter of 2021</b> (early accepted
papers will be accessible online before the deadline)</span><span lang="EN-CA" style="font-family:Calibri,sans-serif">.</span><span lang="EN-CA" style="font-family:Calibri,sans-serif"></span></p>

<h1 style="text-align:justify;line-height:107%;break-after:avoid;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:Calibri,sans-serif">Submission
Format and Review Guidelines </span></h1>

<p class="MsoNormal" style="text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="font-family:Calibri,sans-serif">The submitted manuscripts must be written in English and describe
original research neither published nor currently under review by other
journals or conferences. Parallel submissions will not be accepted. <u>All
papers will undergo a similarity check using <b>iThenticate</b> and the work
similarity should be below 20%.</u> All submitted papers, if relevant to the
theme and objectives of the special issue, will go through an external
peer-review process. Submissions should (<i>i</i>)
conform strictly to the <i>Instructions for
Authors</i> available on the JNSM website and (<i>ii</i>) be submitted through the <i>Editorial
Management</i> system available at <a href="http://www.editorialmanager.com/jons" target="_blank">http://www.editorialmanager.com/jons</a>. </span></p>

<p class="MsoNormal" style="line-height:107%;text-align:justify;font-size:12pt;font-family:Arial,sans-serif;color:black"><b><span lang="EN-CA" style="font-family:Calibri,sans-serif"><br></span></b></p><p class="MsoNormal" style="line-height:107%;text-align:justify;font-size:12pt;font-family:Arial,sans-serif;color:black"><b><span lang="EN-CA" style="font-family:Calibri,sans-serif">Guest Editors
of the Special Issue: </span></b><span lang="EN-CA" style="font-family:Calibri,sans-serif"></span></p>

<p class="MsoNormal" style="margin:0cm 157.7pt 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:Calibri,sans-serif">●<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Moayad Aloqaily, xAnalytics Inc., Canada</span></p>

<p class="MsoNormal" style="margin:0cm 157.7pt 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:Calibri,sans-serif">●<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Salil Kanhere, UNSW Sydney, Australia</span></p>

<p class="MsoNormal" style="margin:0cm 157.7pt 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:Calibri,sans-serif">●<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Paolo Bellavista, DEIS, Università di Bologna, Italy</span></p>

<p class="MsoNormal" style="margin:0cm 157.7pt 0.65pt 18pt;text-align:justify;line-height:112%;font-size:12pt;font-family:Arial,sans-serif;color:black"><span lang="EN-CA" style="line-height:112%;font-family:Calibri,sans-serif">●<span style="font-variant-numeric:normal;font-variant-east-asian:normal;font-stretch:normal;font-size:7pt;line-height:normal;font-family:"Times New Roman"">       </span></span><span dir="LTR"></span><span lang="EN-CA" style="font-family:Calibri,sans-serif">Michele Nogueira, Federal University of Parana, Brazil</span></p></div><div><div dir="ltr" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><br></div><div dir="ltr"><div><div style="font-size:12.8px"><font face="arial, helvetica, sans-serif" color="#0000ff"><i>Best Regards</i></font></div><div style="font-size:12.8px"><font face="arial, helvetica, sans-serif" color="#0000ff"><i>Moayad Aloqaily, Ph.D., P.Eng.</i></font></div></div></div></div></div></div></div></div></div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>
</div></div>