[hpc-announce] FCST 2020 Final CFP: The 3rdInternational Symposium on Future Cyber Security Technologies, Online, December 14-16, 2020

Yufei Sun yufeisun369 at gmail.com
Sun Nov 1 19:05:36 CST 2020

*The 3rd International Symposium on Future Cyber Security Technologies
(FCST 2020)*


*In conjunction with The Seventh International Conference on Internet of
Things: Systems, Management and Security (IoTSMS 2020) Paris, France.
December 14-16, 2020*

*FCST 2020 CFP:*

Hardware systems and Software applications continue to evolve with more
functionalities, complex structures and interactions between them and with
users. Cyber Security risks continue to evolve as well in both quantity in
the same domains as well new types and ways on how to break into computing
systems, software applications, websites, databases, programmable networks
etc. For example, monitoring the car manufacturing industry, we can see
that recent car models have more complex hardware components and automated
programmable features in comparison with their earlier models, this will
increase the risk associated with protecting such systems. Same thing can
be applicable to most other engineering products. Such complex hardware and
programmable techniques bring security opportunities to change the way
cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS),
etc.) are developed and enforced. They also bring security challenges
related to our computing systems and software architectures or any changes
that can be directly or indirectly related to them due to the complex
interactions between them. The 3rd International Symposium on Future Cyber
Security Technologies (FCST 2020) will focus on issues related to future
cyber security challenges as well as opportunities which mainly highlight
the above mentioned aspects.

The 3rd IEEE International Symposium on Future Cyber Security Technologies
(FCST 2020) will be a forum for scientists, researchers, students, and
practitioners to present their latest research results, ideas,
developments, and applications in the areas of cyber security techniques,
security challenges and opportunities for emerging technologies such as
cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G,
SDN and many others . We are mainly interested in receiving state of the
art work on different aspect of future cyber security management system,
security and privacy, cloud computing and big data supported security
systems to mention but few.

*The topics of interest for this workshop include, but are not limited to:*

·        Cyber Security Techniques Architectures and Design

·        Cyber Security Systems

·        Cyber Security Techniques Integration

·        Cyber Security Techniques Orchestration

·        Cyber Security Techniques Based Network Control plane design

·        Cyber Security Techniques Based NetworkData plane design

·        Cyber Security Techniques Performance Management

·        Cyber Security Techniques for Cloud based DataCenter

·        Cyber Security Techniques for 5G Networks

·        Cyber Security Techniques for Internet of Things (IoT)

·        Cyber Security Techniques for Big Data Computing

·        Cyber Security Techniques for large scale storage system

·        Hardware system design for Cyber Security

·  Cyber Security Techniques management

·  Radio Access Network virtualization

·  Cyber Security Techniques for programmable Networks

·  Cyber Security Techniques for Edge and Fog Computing

·  Cyber Security Techniques Cloud Computing

·  Cyber Security Techniques for Software Defined Network (SDN)

·  Cyber Security Techniques Network Function Virtualization (NFV)

·  Cyber Security Techniques Case studies

*Submissions Guidelines and Proceedings*

Manuscripts should be prepared in 10-point font using the IEEE 8.5" x 11"
two-column format (IEEE Templates
All papers should be in PDF format, and submitted electronically at Paper
Submission Link. A full paper must not exceed the stated length (including
all figures, tables and references). Submitted papers must present original
unpublished research that is not currently under review for any other
conference or journal. Papers not following these guidelines may be
rejected without review. Also submissions received after the due date,
exceeding length limit, or not appropriately structured may also not be
considered. Authors may contact the Program Chair for further information
or clarification.

All submissions are peer-reviewed by at least three reviewers. Accepted
papers will appear in the IoTSMS Proceeding and to be submitted to IEEE
Xplore for inclusion. The proceedings are also submitted for indexing to EI
(Compendex), Scopus and other indexing services like DBLP.

Submitted papers must include original work, and must not be under
consideration for another conference or journal. Submission of regular
papers must not exceed 8 pages and must follow the IEEE paper format.
Please include up to 7 keywords, complete postal and e-mail address, and
fax and phone numbers of the corresponding author. Authors of accepted
papers are expected to present their work at the conference. Submitted
papers that are deemed of good quality but that could not be accepted as
regular papers will be accepted as short papers. Length of short papers

*Important Dates*

Submission Date: 5 November, 2020 (Final and Firm)
Notification to Authors: 15 November, 2020
Camera Ready Submission: 1 December, 2020

*Journal Special Issues*

Selected papers from the presented papers will be invited to submit an
extended version to number of journals. Papers will be selected based on
their reviewers’ scores and appropriateness to the Journal’s theme. All
extended versions will undergo reviews and must represent original
unpublished research work. Further details will be made available at a
later stage.

Please send any inquiry to the Emerging Tech. Network Team at:
emergingtechnetwork at gmail.com

More information about the hpc-announce mailing list