活动简介

Hardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The 1st International Symposium on Future Cyber Security Technologies (FCST 2018) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.

The 1st IEEE International Symposium on Future Cyber Security Technologies (FCST 2018) will be a forum for scientists, researchers, students, and practitioners to present their latest research results, ideas, developments, and applications in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G, SDN and many others . We are mainly interested in receiving state of the art work on different aspect of future cyber security management system, security and privacy, cloud computing and big data supported security systems to mention but few.

组委会

General Co-chairs

 Izzat Alsmadi, Texas A&M, San Antonio, USA

 Yunpeng (Jack) Zhang, University of Houston, USA

 

Technical Program Co-chairs

 Zilong Ye, California State University, Los Angeles, USA

 Issa Khalil, Qatar Foundation, Qatar

 

Steering Committee

 Izzat Alsmadi, Texas A&M, San Antonio, USA

 Yunpeng (Jack) Zhang, University of Houston, USA

 Cristina Cervelló-Pastor,Universitat Politecnica de Catalunya, Spain

 Zilong Ye, California State University, Los Angeles, USA

 Gregorio Martinez Perez, University of Murcia, Spain

 

征稿信息

重要日期

2018-07-15
初稿截稿日期
2018-08-25
初稿录用日期
  • Cyber Security Techniques Architectures and Design
  • Cyber Security Systems
  • Cyber Security Techniques Integration
  • Cyber Security Techniques Orchestration
  • Cyber Security Techniques Based Network Control plane design
  • Cyber Security Techniques Based NetworkData plane design
  • Cyber Security Techniques Performance Management
  • Cyber Security Techniques for Cloud based DataCenter
  • Cyber Security Techniques for 5G Networks
  • Cyber Security Techniques for Internet of Things (IoT)
  • Cyber Security Techniques for Big Data Computing
  • Cyber Security Techniques for large scale storage system
  • Hardware system design for Cyber Security Techniques/li>
  • Cyber Security Techniques management
  • Radio Access Network virtualization
  • Cyber Security Techniques for programmable Networks
  • Cyber Security Techniques for Edge and Fog Computing
  • Cyber Security Techniques Cloud Computing
  • Cyber Security Techniques for Software Defined Network (SDN)
  • Cyber Security Techniques Network Function Virtualization (NFV)
  • Cyber Security Techniques Case studies

作者指南

Papers selected for presentation will appear in the IoTSMS Proceedings,  be submitted to IEEE Xplore for inclusion. Papers must be 6 pages in IEEE format, 10pt font using the IEEE 8.5" x 11" two-column format, single space, A4 format. All papers should be in PDF format, and submitted electronically at Paper Submission Link. A full paper must not exceed the stated length (including all figures, tables and references). Submitted papers must present original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines may be rejected without review. Also submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered. 

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    10月15日

    2018

    10月18日

    2018

  • 07月15日 2018

    初稿截稿日期

  • 08月25日 2018

    初稿录用通知日期

  • 10月18日 2018

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询