posted by user: yaseramd1 || 477 views || tracked by 2 users: [display]

FCST 2025 : The 8th International Symposium on Future Cyber Security Technologies

FacebookTwitterLinkedInGoogle

Link: https://icsc-conference.org/2025/Workshops/FCST2025/
 
When May 19, 2025 - May 22, 2025
Where Tampa, Florida, USA
Submission Deadline Mar 23, 2025
Notification Due Apr 7, 2025
Final Version Due Apr 21, 2025
Categories    artificial intelligence   cybersecurity   cloud computing   internet of things
 

Call For Papers

Hardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The International Symposium on Future Cyber Security Technologies (FCST) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.

The FCST 2025 symposium addresses the use of advanced intelligent systems in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G, SDN and many others . We are mainly interested in receiving state of the art work on different aspect of future cyber security management system, security and privacy, cloud computing and big data supported security systems to mention but few.

Cyber Security Techniques Architectures and Design
Cyber Security Systems
Cyber Security Techniques Integration
Cyber Security Techniques Orchestration
Network forensics using intelligent systems and data analytics
Cyber Security Techniques Based Network Control plane design
Cyber Security Techniques for Cloud based DataCenter
Cyber Security Techniques for 5G Networks
Adversarial Machine learning and Backdoor Attacks
Blockchain Systems for Cyber Security
Cyber Security Techniques for Internet of Things (IoT)
Cyber Security Techniques Based NetworkData plane design
Cyber Security Techniques Performance Management

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
CYBER 2025   The Tenth International Conference on Cyber-Technologies and Cyber-Systems
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SENSORCOMM 2025   The Nineteenth International Conference on Sensor Technologies and Applications
ICCTA--ESCI 2025   2025 11th International Conference on Computer Technology Applications (ICCTA 2025)--ESCI
Collection_DependXAIdata 2025   Topical Collection on Dependable and Reliable Datasets for Explainable Artificial Intelligence and Cyber Security Research