<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body>
<font size="-2">--------------------------------------------------------------------------------------------------
</font><br>
<div class="moz-forward-container">
<div class="moz-text-html" lang="x-unicode">
<div class="moz-text-html" lang="x-unicode"><font size="-2">
Apologies for cross posting. Please feel free to contribute
and to forward. <br>
--------------------------------------------------------------------------------------------------
</font>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">CALL FOR PAPERS</span></p>
<b> </b>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt" align="center"><b><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span></b><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">International Workshop on Artificial
Intelligence and Security Challenges in Emerging Networks
(AISCEN 2020)</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family:"Times New
Roman"; mso-fareast-language:FR"> <a href="https://sites.google.com/view/aiscen2019" moz-do-not-send="true"><span style="mso-ansi-language:EN-US" lang="EN-US">https://sites.google.com/view/aiscen2020</span></a></span><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"></span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> to be held in conjunction with the 11th
International Conference on Emerging Ubiquitous Systems
and Pervasive Networks (EUSPN).</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> November 2-5, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt" align="center"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Madeira, Portugal</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">The recent rise of emerging networking
technologies such as social networks, content centric
networks, IoT networks, etc. have attracted lots of
attention from academia as well as industry. In fact, the
attractiveness of such networks leads to the increase of
security risks in particularly privacy and security
threats. Besides, recent years have seen a dramatic
increase in applications of artificial intelligence (AI),
machine learning, and data mining to security and privacy
problems.</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">The purpose of this workshop is to
disseminate cutting-edge research results, highlight
research challenges and open issues, and promotes further
research interest and activities in both security and
artificial intelligence in emerging networking
technologies.</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Moreover, does this workshop welcome
submissions that evaluate existing research results by
reproducing experiments.</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">INSTRUCTIONS FOR AUTHORS<br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Topics of interest include, but are not
limited to following topics:</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">1. Social intelligence/ Artificial
Intelligence</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">2. AI for routing protocols</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">3. Spam detection</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">4. Phishing detection and prevention</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">5. Botnet detection</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">6. Intrusion detection and response</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">7. Secure multiparty computation and
cryptographic approaches</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">8. Privacy-preserving data mining</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">9. AI approaches to trust and reputation</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">10. Vulnerability testing through intelligent
probing (e.g. fuzzing)</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">11. Content-driven security policy management
& access control</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">12. Techniques and methods for generating
training and test sets</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">13. Anomalous behavior detection (e.g. fraud
prevention, authentication)</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"> </span><br>
<span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">SUBMISSION SITE</span><u><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></u></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><a href="https://easychair.org/conferences/?conf=aiscen2020" target="_blank" moz-do-not-send="true">https://easychair.org/conferences/?conf=aiscen2020</a><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">IMPORTANT DATES<br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Papers Submission Due: July 15, 2020
(extended)<br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Authors Notifications: August 2, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Final Manuscript Due: August 30, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">EUSPN 2020: November 2,
2020 – November 5, 2020</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"><br>
</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">WORKSHOP CHAIR</span></p>
<p class="MsoNormal" style="margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal;tab-stops:45.8pt 91.6pt 137.4pt 183.2pt 229.0pt
274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt
595.4pt 641.2pt 687.0pt 732.8pt"><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US">Dr Ryma Abassi (<a class="moz-txt-link-abbreviated" href="mailto:ryma.abassi@supcom.tn" moz-do-not-send="true">ryma.abassi@supcom.tn</a>)<br>
</span></p>
<br>
<span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family: "Times New
Roman";mso-ansi-language:EN-US;mso-fareast-language:FR" lang="EN-US"></span><span style="font-size:10.0pt;font-family:"Courier
New";mso-fareast-font-family:"Times New
Roman";
mso-ansi-language:EN-US;mso-fareast-language:FR"><span lang="EN-US"></span></span> ------------------------<br>
<div>
<p><font size="-2" face="Courier New">Dr Ryma Abassi<br>
</font></p>
<font size="-2"> </font></div>
<font size="-2"> </font>
<div>
<p><font size="-2" face="Courier New">Digital Security
Reseach Lab, SUPCOM</font></p>
</div>
<font size="-2"> </font>
<div><font size="-2"> </font>
<p><font size="-2" face="Courier New">University of
Carthage, Tunisia</font></p>
</div>
<div>
<p><br>
</p>
<div class="adL"><br>
</div>
</div>
</div>
</div>
</div>
</body>
</html>