CHI-ANNOUNCEMENTS Archives

ACM SIGCHI General Interest Announcements (Mailing List)

CHI-ANNOUNCEMENTS@LISTSERV.ACM.ORG

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Sandra Sendra <[log in to unmask]>
Reply To:
Sandra Sendra <[log in to unmask]>
Date:
Thu, 14 Jun 2018 00:19:58 +0200
Content-Type:
text/plain
Parts/Attachments:
text/plain (115 lines)
*The First International Symposium on Future Cyber Security Technologies 
(FCST 2018) *

*http://emergingtechnet.org/FCST2018/*

*in conjunction with*

*The Fifth International Conference on Internet of Things: Systems, 
Management and Security (IoTSMS 2018)* 
<http://emergingtechnet.org/IoTSMS2018/index.php>*

Valencia, Spain. October 15-18, 2018*

	

Hardware systems and Software applications continue to evolve with more 
functionalities, complex structures and interactions between them and 
with users. Cyber Security risks continue to evolve as well in both 
quantity in the same domains as well new types and ways on how to break 
into computing systems, software applications, websites, databases, 
programmable networks etc. For example, monitoring the car manufacturing 
industry, we can see that recent car models have more complex hardware 
components and automated programmable features in comparison with their 
earlier models, this will increase the risk associated with protecting 
such systems. Same thing can be applicable to most other engineering 
products. Such complex hardware and programmable techniques bring 
security opportunities to change the way cyber security controls (e.g. 
firewalls, Intrusion Detection Systems (IDS), etc.) are developed and 
enforced. They also bring security challenges related to our computing 
systems and software architectures or any changes that can be directly 
or indirectly related to them due to the complex interactions between 
them. The 1st International Symposium on Future Cyber Security 
Technologies (FCST 2018) will focus on issues related to future cyber 
security challenges as well as opportunities which mainly highlight the 
above mentioned aspects. The 1st IEEE International Symposium on Future 
Cyber Security Technologies (FCST 2018) will be a forum for scientists, 
researchers, students, and practitioners to present their latest 
research results, ideas, developments, and applications in the areas of 
cyber security techniques, security challenges and opportunities for 
emerging technologies such as cloud computing, Internet of Things (IoT) 
and Edge Computing, big data, 5G, SDN and many others. We are mainly 
interested in receiving state of the art work on different aspect of 
future cyber security management system, security and privacy, cloud 
computing and big data supported security systems to mention but few.

*Topics of interest **
*==============
Authors are encouraged to submit their original work, which is not 
submitted elsewhere, to this workshop. The topics of the workshop 
include but not limited to:

  * Cyber Security Techniques Architectures and Design
  * Cyber Security Systems
  * Cyber Security Techniques Integration
  * Cyber Security Techniques Orchestration
  * Cyber Security Techniques Based Network Control plane design
  * Cyber Security Techniques Based NetworkData plane design
  * Cyber Security Techniques Performance Management
  * Cyber Security Techniques for Cloud based DataCenter
  * Cyber Security Techniques for 5G Networks
  * Cyber Security Techniques for Internet of Things (IoT)
  * Cyber Security Techniques for Big Data Computing
  * Cyber Security Techniques for large scale storage system
  * Hardware system design for Cyber Security Techniques/li>
  * Cyber Security Techniques management
  * Radio Access Network virtualization
  * Cyber Security Techniques for programmable Networks
  * Cyber Security Techniques for Edge and Fog Computing
  * Cyber Security Techniques Cloud Computing
  * Cyber Security Techniques for Software Defined Network (SDN)
  * Cyber Security Techniques Network Function Virtualization (NFV)
  * Cyber Security Techniques Case studies

*Paper Submission : *
=============

Authors are requested to submit papers reporting original research 
results and experience. The page limit for full papers is 6 pages. 
Papers should be prepared using IEEE two-column template.

IEEE Computer Society Proceedings Author Guidelines are available at: 
IEEE Guidelines Link <http://www.computer.org/portal/web/cscps/submission>

Papers should be submitted as PDF files via the EasyChair: EasyChair 
Link <https://easychair.org/conferences/?conf=anlp2018>

Submitted research papers may not overlap with papers that have already 
been published or that are simultaneously submitted to a journal or a 
conference. All papers accepted for this conference are peer-reviewed 
and are to be published in the IoTSMS conference proceedings and will be 
submitted for inclusion in IEEE Xplore Digital Library.

*Important Dates : *
=============

*Full Paper Submission:*  July 15, 2018
*Notification of Decision:*  August 25th, 2018
*Camera-Ready and Registration :* September 5th, 2018

All questions about submissions should be emailed to: 
[log in to unmask] <mailto:[log in to unmask]>

​


    ---------------------------------------------------------------
    For news of CHI books, courses & software, join CHI-RESOURCES
     mailto: [log in to unmask]

    To unsubscribe from CHI-ANNOUNCEMENTS send an email to
     mailto:[log in to unmask]

    For further details of CHI lists see http://listserv.acm.org
    ---------------------------------------------------------------

ATOM RSS1 RSS2