<div dir="ltr">
<div id="m_-4984744098285929863m_-7755948012939299513gmail-:qe" aria-label="Message Body" role="textbox" aria-multiline="true" style="direction:ltr;min-height:476px" aria-controls=":yq" aria-expanded="false">
<div id="m_-4984744098285929863m_-7755948012939299513gmail-:jv" aria-label="Message Body" role="textbox" aria-multiline="true" style="direction:ltr;min-height:476px" aria-controls=":me" aria-expanded="false">



















<p class="MsoNormal" style="line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>[Apologies if you got multiple copies of this
invitation]<span></span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;font-family:"Arial",sans-serif;color:rgb(34,34,34)">The 7th
International Symposium on Future Cyber Security Technologies (<a name="m_-4984744098285929863_m_-7755948012939299513_m_8853485045621850867_m_2685677397495467524__Hlk168679987">FCST</a> 2024)<span></span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;font-family:"Arial",sans-serif;color:rgb(34,34,34)"><span> </span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;font-family:"Arial",sans-serif;color:rgb(34,34,34)">Co-located
with <span></span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;font-family:"Arial",sans-serif;color:rgb(34,34,34)"><span> </span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;font-family:"Arial",sans-serif;color:rgb(34,34,34)">The 11th
International Conference on Internet of Things: Systems, Management and
Security (IOTSMS 2024)</span><span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;background:white;font-size:12pt;font-family:"Times New Roman",serif"><a href="https://emergingtechnet.org/IOTSMS2024/Workshops/FCST2024/" style="color:blue;text-decoration:underline" target="_blank"><span style="font-family:"Arial",sans-serif">https://emergingtechnet.org/IOTSMS2024/Workshops/FCST2024/</span></a><span style="font-family:"Arial",sans-serif"><span></span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;background:white;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;font-family:"Arial",sans-serif;color:rgb(34,34,34)"><span> </span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;background:white;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:14pt;font-family:"Arial",sans-serif;color:rgb(34,34,34)">Malmö, Sweden. September 2-5, 2024<span></span></span></p>

<p class="MsoNormal" align="center" style="text-align:center;line-height:105%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;line-height:105%;font-family:"Times New Roman",serif;color:red">Technically
Co-Sponsored by IEEE Sweden Section</span><span style="font-size:12pt;line-height:105%;font-family:"Times New Roman",serif"><span></span></span></p>

<p align="center" style="margin:0in 0in 0.0001pt;text-align:center;background:white;font-size:12pt;font-family:"Times New Roman",serif"><span> </span></p>

<p style="margin:0in 0in 0.0001pt;background:white;font-size:12pt;font-family:"Times New Roman",serif"><u><span style="font-size:14pt;color:black;letter-spacing:0.75pt">FCST 2024 CFP</span></u><span></span></p>

<p style="margin-top:0in;background:white;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(51,51,51)">Hardware systems and Software
applications continue to evolve with more functionalities, complex structures
and interactions between them and with users. Cyber Security risks continue to
evolve as well in both quantity in the same domains as well new types and ways
on how to break into computing systems, software applications, websites,
databases, programmable networks etc. For example, monitoring the car
manufacturing industry, we can see that recent car models have more complex
hardware components and automated programmable features in comparison with
their earlier models, this will increase the risk associated with protecting
such systems. Same thing can be applicable to most other engineering products.
Such complex hardware and programmable techniques bring security opportunities
to change the way cyber security controls (e.g. firewalls, Intrusion Detection
Systems (IDS), etc.) are developed and enforced. They also bring security
challenges related to our computing systems and software architectures or any
changes that can be directly or indirectly related to them due to the complex
interactions between them. The 6th International Symposium on Future Cyber
Security Technologies (FCST 2024) will focus on issues related to future cyber
security challenges as well as opportunities which mainly highlight the above
mentioned aspects.<span></span></span></p>

<p style="margin-top:0in;background:white;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(51,51,51)">The 7th IEEE International
Symposium on Future Cyber Security Technologies (FCST 2024) will be a forum for
scientists, researchers, students, and practitioners to present their latest research
results, ideas, developments, and applications in the areas of cyber security
techniques, security challenges and opportunities for emerging technologies
such as cloud computing, Internet of Things (IoT) and Edge Computing, big data,
5G, SDN and many others . We are mainly interested in receiving state of the
art work on different aspect of future cyber security management system,
security and privacy, cloud computing and big data supported security systems
to mention but few.The topics of interest include (but are not limited to):<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(51,51,51)"><br>
</span><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques Architectures and
Design <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Systems <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques Integration <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques Orchestration <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques Based Network Control plane design <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques Based Network Data plane design <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques Performance Management <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for Cloud based DataCenter <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for 5G Networks <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for Internet of Things (IoT) <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for Big Data Computing <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for large scale storage system <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Hardware system design for Cyber Security
Techniques<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Cyber Security Techniques management <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span>  </span>Radio Access Network virtualization <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for programmable Networks <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for Edge and Fog Computing <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques Cloud Computing <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques for Software Defined Network (SDN) <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol">·</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span> 
</span>Cyber Security Techniques Network Function Virtualization (NFV) <span></span></span></p>

<p style="margin-top:0in;background:white;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-family:Symbol">·</span><span>  </span>Cyber Security Techniques Case studies<span></span></p>

<p style="margin-top:0in;background:white;margin-right:0in;margin-left:0in;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(51,51,51)"> </span><span></span></p>

<p style="margin:0in 0in 0.0001pt;background:white;font-size:12pt;font-family:"Times New Roman",serif"><u><span style="font-size:13pt;color:black;letter-spacing:0.75pt">Submissions
Guidelines and Proceedings</span></u><span></span></p>

<p style="margin:0in 0in 12pt;background:white;font-size:12pt;font-family:"Times New Roman",serif"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(51,51,51);background:white">Manuscripts should be prepared in 10-point font
using the IEEE 8.5" x 11" two-column format (</span><a href="https://protect-au.mimecast.com/s/0FRWCr810kCvBLJEfz4LG3?domain=ieee.org" style="color:blue;text-decoration:underline" target="_blank"><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(198,11,30);background:white">IEEE Templates</span></a><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(51,51,51);background:white">). All papers should be in PDF format, and submitted
electronically at Paper Submission Link. A full paper must not exceed the
stated length (including all figures, tables and references). Submitted papers
must present original unpublished research that is not currently under review
for any other conference or journal. Papers not following these guidelines may
be rejected without review. Also submissions received after the due date,
exceeding length limit, or not appropriately structured may also not be
considered. Authors may contact the Program Chair for further information or
clarification.</span><span style="font-size:10pt;font-family:"Arial",sans-serif;color:rgb(51,51,51)"><br>
<br>
<span style="background:white">All submissions are peer-reviewed by at least
two reviewers. Accepted papers will appear in the IoTSMS Proceeding and to be
submitted to IEEE Xplore for inclusion. The proceedings are also submitted for
indexing to EI (Compendex), Scopus and other indexing services like DBLP.</span><br>
<br>
<span style="background:white">Submitted papers must include original work, and
must not be under consideration for another conference or journal. Submission
of regular papers must not exceed 8 pages and must follow the IEEE paper
format. Please include up to 7 keywords, complete postal and e-mail address,
and fax and phone numbers of the corresponding author. Authors of accepted
papers are expected to present their work at the conference. Submitted papers
that are deemed of good quality but that could not be accepted as regular papers
will be accepted as short papers.</span><br>
<br>
</span><span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;text-align:justify;line-height:106%;font-size:11pt;font-family:"Calibri",sans-serif"><u><span style="font-size:13.5pt;line-height:106%;color:black">Important
Dates:</span></u><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:"Times New Roman",serif;color:black"></span><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:red">Submission Due: July 20th, 2024 (Firm and Final)<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;font-family:"Times New Roman",serif">Notification: July 30th, 2024<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;font-family:"Times New Roman",serif">Camera-ready submission: August
10th, 2024<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span> </span></span></p>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><u><span style="font-size:13.5pt;color:black">Organization
Committee<span></span></span></u></p>

<p style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       </span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif">Izzat Alsmadi, Texas A&M, San Antonio, USA<span></span></span></p>

<p style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       </span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif">Yunpeng (Jack) Zhang, University of Houston, USA <span></span></span></p>

<p style="margin:0in 0in 0.0001pt 0.5in;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:12pt;font-family:Symbol"><span>·<span style="font:7pt "Times New Roman"">       </span></span></span><span style="font-size:12pt;font-family:"Times New Roman",serif">Abdallah Khreishah, New Jersey Institute of Technology, USA <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span><span> </span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:106%;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:12pt;line-height:106%;font-family:"Times New Roman",serif">Contact:</span></u></b><span><span></span></span></p>

<p class="MsoNormal" style="line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;line-height:106%">Please send any
inquiry to : Fahed Alkhabbas  at: </span><a href="mailto:fahed.alkhabbas@mau.se" style="color:blue;text-decoration:underline" target="_blank"><span style="font-size:13.5pt;line-height:106%;color:windowtext;text-decoration:none">fahed.alkhabbas@mau.se</span></a><span style="font-size:13.5pt;line-height:106%"><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>





</div>

</div>

</div>