<div dir="ltr">
<div id="m_-1639140858124916633m_-8103487153495836969gmail-:jau" style="display:block"><div id="m_-1639140858124916633m_-8103487153495836969gmail-:jaq" aria-label="Message Body" role="textbox" aria-multiline="true" style="direction:ltr;min-height:294px">
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:14pt;line-height:107%">The 4th
International Symposium on Future Cyber Security Technologies (FCST 2021)<span></span></span></b></p>
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><a href="http://emergingtechnet.org/FCST2021/" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span style="font-size:14pt;line-height:107%">http://emergingtechnet.org/FCST2021/</span></a><span style="font-size:14pt;line-height:107%"><span></span></span></p>
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:14pt;line-height:107%">In
conjunction with <br>
</span></b><a href="https://emergingtechnet.org/IOTSMS2021/" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><b><span style="font-size:14pt;line-height:107%">The 8th
International Conference on Internet of Things: Systems, Management and
Security (IoTSMS 2021)</span></b></a><b><span style="font-size:14pt;line-height:107%"><span></span></span></b></p>
<p class="MsoNormal" style="text-align:center;margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif" align="center"><b><span style="font-size:14pt;line-height:107%">Gandia,
Spain. December 6-9, 2021<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:14pt;line-height:107%">FCST 2021 CFP:</span></u></b><u><span style="font-size:14pt;line-height:107%"><span></span></span></u></p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="color:rgb(55,54,50)">Hardware systems and Software
applications continue to evolve with more functionalities, complex structures and
interactions between them and with users. Cyber Security risks continue to
evolve as well in both quantity in the same domains as well new types and ways
on how to break into computing systems, software applications, websites,
databases, programmable networks etc. For example, monitoring the car
manufacturing industry, we can see that recent car models have more complex
hardware components and automated programmable features in comparison with
their earlier models, this will increase the risk associated with protecting
such systems. Same thing can be applicable to most other engineering products.
Such complex hardware and programmable techniques bring security opportunities
to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems
(IDS), etc.) are developed and enforced. They also bring security challenges
related to our computing systems and software architectures or any changes that
can be directly or indirectly related to them due to the complex interactions
between them. The<span> </span>International
Symposium on Future Cyber Security Technologies (FCST 2021) will focus on
issues related to future cyber security challenges as well as opportunities
which mainly highlight the above mentioned aspects. <span></span></span></p>
<p style="margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="color:rgb(55,54,50)">The<span>
</span>IEEE International Symposium on Future Cyber Security Technologies (FCST
2021) will be a forum for scientists, researchers, students, and practitioners
to present their latest research results, ideas, developments, and applications
in the areas of cyber security techniques, security challenges and
opportunities for emerging technologies such as cloud computing, Internet of
Things (IoT) and Edge Computing,big data, 5G, SDN and many others . We are
mainly interested in receiving state of the art work on different aspect of
future cyber security management system, security and privacy, cloud computing
and big data supported security systems to mention but few.<span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:18pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">The topics of interest for this workshop include, but are not
limited to:<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques Architectures and Design<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security Systems<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques Integration <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques Orchestration<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques Based Network Control plane design<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques Based NetworkData plane design<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques Performance Management<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques for Cloud based DataCenter<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques for 5G Networks<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques for Internet of Things (IoT)<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques for Big Data Computing<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Cyber Security
Techniques for large scale storage system<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt 0.25in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:Symbol;color:rgb(55,54,50)"><span>·<span style="font:7pt "Times New Roman"">
</span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif;color:rgb(55,54,50)">Hardware system design
for Cyber Security<span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>
</span>Cyber Security Techniques management <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>
</span>Radio Access Network virtualization <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>
</span>Cyber Security Techniques for programmable Networks <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>
</span>Cyber Security Techniques for Edge and Fog Computing <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>
</span>Cyber Security Techniques Cloud Computing <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>
</span>Cyber Security Techniques for Software Defined Network (SDN) <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>
</span>Cyber Security Techniques Network Function Virtualization (NFV) <span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;line-height:107%;font-family:Symbol">·</span><span style="font-size:12pt;line-height:107%;font-family:"Times New Roman",serif"><span> </span>Cyber Security
Techniques Case studies</span><span style="font-size:14pt;line-height:107%"><span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif">Submissions
Guidelines and Proceedings<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 12pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif">Manuscripts should be prepared in 10-point font using the
IEEE 8.5" x 11" two-column format (</span><a href="https://www.ieee.org/conferences_events/conferences/publishing/templates.html" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:blue">IEEE Templates</span></a><span style="font-size:12pt;font-family:"Times New Roman",serif">). All papers should be in PDF format, and submitted
electronically at Paper Submission Link. A full paper must not exceed the
stated length (including all figures, tables and references). Submitted papers
must present original unpublished research that is not currently under review
for any other conference or journal. Papers not following these guidelines may
be rejected without review. Also submissions received after the due date,
exceeding length limit, or not appropriately structured may also not be considered.
Authors may contact the Program Chair for further information or clarification.
<br>
<br>
All submissions are peer-reviewed by at least three reviewers. Accepted papers
will appear in the IoTSMS Proceeding and to be submitted to IEEE Xplore for
inclusion. The proceedings are also submitted for indexing to EI (Compendex),
Scopus and other indexing services like DBLP. <br>
<br>
Submitted papers must include original work, and must not be under
consideration for another conference or journal. Submission of regular papers
must not exceed 8 pages and must follow the IEEE paper format. Please include
up to 7 keywords, complete postal and e-mail address, and fax and phone numbers
of the corresponding author. Authors of accepted papers are expected to present
their work at the conference. Submitted papers that are deemed of good quality
but that could not be accepted as regular papers will be accepted as short
papers. Length of short papers <span></span></span></p>
<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:12pt;font-family:"Times New Roman",serif">Important
Dates<span></span></span></b></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><a name="m_-1639140858124916633_m_-8103487153495836969__Hlk81526063"><span style="font-size:14pt;font-family:"Times New Roman",serif;color:red">Submission Date: 15 Sept, 2021</span></a><span><span style="font-size:14pt;font-family:"Times New Roman",serif"><span></span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:14pt;font-family:"Times New Roman",serif">Notification to Authors: 21 Oct, 2021<span></span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span style="font-size:14pt;font-family:"Times New Roman",serif">Camera Ready Submission: 30th Oct, 2021<span></span></span></span></p>
<span></span>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>
<p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Times New Roman",serif">Please send
any inquiry to the Emerging Tech. Network Team at</span>: <a href="mailto:emergingtechnetwork@gmail.com" style="color:rgb(5,99,193);text-decoration:underline" target="_blank"><span style="color:blue">emergingtechnetwork@gmail.com</span></a><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>
<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;line-height:107%"><span> </span></span></p>
</div></div>
</div>