The 8th International Symposium on Future Cyber Security Technologies (FCST 2025)
https://icsc-conference.org/2025/Workshops/FCST2025/
Hybrid Event
Tampa, Florida, USA. May 19-22, 2025
Co-located with
The Fifth IEEE Intelligent Cybersecurity Conference (ICSC2025)
Technically Co-Sponsored by IEEE Florida West Coast Section
FCST 2025 CFP:
Hardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The International Symposium on Future Cyber Security Technologies (FCST) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.
The FCST 2025 symposium addresses the use of advanced intelligent systems in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing, big data, 5G, SDN and many others . We are mainly interested in receiving state of the art work on different aspect of future cyber security management system, security and privacy, cloud computing and big data supported security systems to mention but few.
- Cyber Security Techniques Architectures and Design
- Cyber Security Systems
- Cyber Security Techniques Integration
- Cyber Security Techniques Orchestration
- Network forensics using intelligent systems and data analytics
- Cyber Security Techniques Based Network Control plane design
- Cyber Security Techniques for Cloud based DataCenter
- Cyber Security Techniques for 5G Networks
- Adversarial Machine learning and Backdoor Attacks
- Blockchain Systems for Cyber Security
- Cyber Security Techniques for Internet of Things (IoT)
- Cyber Security Techniques Based Network Data plane design
- Cyber Security Techniques Performance Management
Submissions Guidelines and Proceedings
Manuscripts should be prepared in 10-point font using the IEEE 8.5″ x 11″ two-column format. All papers should be in PDF format, and submitted electronically at Paper Submission Link. A full paper can be up to 6 pages (including all figures, tables and references). Submitted papers must present original unpublished research that is not currently under review for any other conference or journal. Papers not following these guidelines may be rejected without review. Also submissions received after the due date, exceeding length limit, or not appropriately structured may also not be considered. Authors may contact the Program Chair for further information or clarification. All submissions are peer-reviewed by at least three reviewers. Accepted papers will appear in the ICSC Proceeding, and be published by the IEEE Computer Society Conference Publishing Services and be submitted to IEEE Xplore for inclusion.
Important Dates:
- Paper submission deadline: March 23rd 2025 (Firm and Final)
- Notification of acceptance: April 7th, 2025
- Camera-ready Submission: April 21st, 2025
Contact:
Please send any inquiry on ICSC to Fahed Alkhabbas at: fahed.alkhabbas@mau.se