<div dir="ltr">
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:14pt;line-height:107%">The 3rd
International Symposium on Future Cyber Security Technologies (FCST 2020)<span></span></span></b></p>
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><a href="http://emergingtechnet.org/FCST2020/" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span style="font-size:14pt;line-height:107%">http://emergingtechnet.org/FCST2020/</span></a><span style="font-size:14pt;line-height:107%"><span></span></span></p>
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:14pt;line-height:107%">In
conjunction with <br>
The Seventh International Conference on Internet of Things: Systems, Management
and Security (IoTSMS 2020) <br>
<br>
Paris, France. December 14-16, 2020<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:14pt;line-height:107%">FCST 2020 CFP:</span></u></b><u><span style="font-size:14pt;line-height:107%"><span></span></span></u></p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="color:rgb(55,54,50)">Hardware systems and Software
applications continue to evolve with more functionalities, complex structures
and interactions between them and with users. Cyber Security risks continue to
evolve as well in both quantity in the same domains as well new types and ways
on how to break into computing systems, software applications, websites,
databases, programmable networks etc. For example, monitoring the car
manufacturing industry, we can see that recent car models have more complex
hardware components and automated programmable features in comparison with
their earlier models, this will increase the risk associated with protecting
such systems. Same thing can be applicable to most other engineering products.
Such complex hardware and programmable techniques bring security opportunities
to change the way cyber security controls (e.g. firewalls, Intrusion Detection
Systems (IDS), etc.) are developed and enforced. They also bring security
challenges related to our computing systems and software architectures or any
changes that can be directly or indirectly related to them due to the complex
interactions between them. The 3rd International Symposium on Future Cyber
Security Technologies (FCST 2020) will focus on issues related to future cyber
security challenges as well as opportunities which mainly highlight the above
mentioned aspects. <span></span></span></p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="color:rgb(55,54,50)">The 3rd IEEE International Symposium
on Future Cyber Security Technologies (FCST 2020) will be a forum for
scientists, researchers, students, and practitioners to present their latest
research results, ideas, developments, and applications in the areas of cyber
security techniques, security challenges and opportunities for emerging
technologies such as cloud computing, Internet of Things (IoT) and Edge
Computing,big data, 5G, SDN and many others . We are mainly interested in
receiving state of the art work on different aspect of future cyber security
management system, security and privacy, cloud computing and big data supported
security systems to mention but few.<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:18pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">The topics of interest for this workshop include, but are not
limited to:<span></span></span></b></p><font size="2">· Cyber Security Techniques Architectures and Design<br>· Cyber Security Systems<br>· Cyber Security Techniques Integration<br>· Cyber Security Techniques Orchestration<br>· Cyber Security Techniques Based Network Control plane design<br>· Cyber Security Techniques Based NetworkData plane design<br>· Cyber Security Techniques Performance Management<br>· Cyber Security Techniques for Cloud based DataCenter<br>· Cyber Security Techniques for 5G Networks<br>· Cyber Security Techniques for Internet of Things (IoT)<br>· Cyber Security Techniques for Big Data Computing<br>· Cyber Security Techniques for large scale storage system<br>· Hardware system design for Cyber Security<br>· Cyber Security Techniques management<br>· Radio Access Network virtualization<br>· Cyber Security Techniques for programmable Networks<br>· Cyber Security Techniques for Edge and Fog Computing<br>· Cyber Security Techniques Cloud Computing<br>· Cyber Security Techniques for Software Defined Network (SDN)<br>· Cyber Security Techniques Network Function Virtualization (NFV)<br><br>· Cyber Security Techniques Case studies</font><span style="font-size:14pt;line-height:107%"><span></span></span>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif">Submissions
Guidelines and Proceedings<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 12pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Manuscripts should be prepared in 10-point font using the
IEEE 8.5" x 11" two-column format (</span><a href="https://www.ieee.org/conferences_events/conferences/publishing/templates.html" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:blue">IEEE Templates</span></a><span style="font-size:12pt;font-family:"Times New Roman",serif">). All papers should be in PDF format, and submitted
electronically at Paper Submission Link. A full paper must not exceed the
stated length (including all figures, tables and references). Submitted papers
must present original unpublished research that is not currently under review
for any other conference or journal. Papers not following these guidelines may
be rejected without review. Also submissions received after the due date,
exceeding length limit, or not appropriately structured may also not be
considered. Authors may contact the Program Chair for further information or
clarification. <br>
<br>
All submissions are peer-reviewed by at least three reviewers. Accepted papers
will appear in the IoTSMS Proceeding and to be submitted to IEEE Xplore for
inclusion. The proceedings are also submitted for indexing to EI (Compendex),
Scopus and other indexing services like DBLP. <br>
<br>
Submitted papers must include original work, and must not be under
consideration for another conference or journal. Submission of regular papers
must not exceed 8 pages and must follow the IEEE paper format. Please include
up to 7 keywords, complete postal and e-mail address, and fax and phone numbers
of the corresponding author. Authors of accepted papers are expected to present
their work at the conference. Submitted papers that are deemed of good quality
but that could not be accepted as regular papers will be accepted as short
papers. Length of short papers <span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif">Important
Dates<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 12pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:red">Submission Date: 25 October, 2020</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><br>
Notification to Authors: 15 November, 2020<br>
Camera Ready Submission: 1 December, 2020<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif">Journal
Special Issues<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;line-height:107%;font-family:"Times New Roman",serif">Selected
papers from the presented papers will be invited to submit an extended version
to number of journals. Papers will be selected based on their reviewers’ scores
and appropriateness to the Journal’s theme. All extended versions will undergo
reviews and must represent original unpublished research work. Further details
will be made available at a later stage.<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Times New Roman",serif">Please send
any inquiry to the Emerging Tech. Network Team at</span>: <a href="mailto:emergingtechnetwork@gmail.com" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span style="color:blue">emergingtechnetwork@gmail.com</span></a><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;line-height:107%"><span> </span></span></p>
</div>