会议信息
FCST' 2025: IEEE International Symposium on Future Cyber Security Technologies
https://icsc-conference.org/2025/Workshops/FCST2025/
截稿日期:
2025-03-23
通知日期:
2025-04-07
会议日期:
2025-05-19
会议地点:
Tampa, Florida, USA
届数:
8
浏览: 11262   关注: 3   参加: 1

征稿
Hardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The International Symposium on Future Cyber Security Technologies (FCST) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.

The FCST 2025 symposium addresses the use of advanced intelligent systems in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G, SDN and many others . We are mainly interested in receiving state of the art work on different aspect of future cyber security management system, security and privacy, cloud computing and big data supported security systems to mention but few.

    Cyber Security Techniques Architectures and Design
    Cyber Security Systems
    Cyber Security Techniques Integration
    Cyber Security Techniques Orchestration
    Network forensics using intelligent systems and data analytics
    Cyber Security Techniques Based Network Control plane design
    Cyber Security Techniques for Cloud based DataCenter
    Cyber Security Techniques for 5G Networks
    Adversarial Machine learning and Backdoor Attacks
    Blockchain Systems for Cyber Security
    Cyber Security Techniques for Internet of Things (IoT)
    Cyber Security Techniques Based NetworkData plane design
    Cyber Security Techniques Performance Management
最后更新 Dou Sun 在 2025-03-08
相关会议
相关期刊
CCF全称影响因子出版商ISSN
Information Technology & People4.900Emerald0959-3845
cJournal of Global Information Technology Management3.000Taylor & Francis1097-198X
International Journal of AnalysisHindawi2314-498X
cFuture Generation Computer Systems6.2Elsevier0167-739X
Journal of Information Technology in ConstructionHerman1400-6529
Virtual and Physical Prototyping8.8Taylor & Francis1745-2759
Frontiers in ICTFrontiers Media S.A.2297-198X
cComputer Speech and Language3.100Elsevier0885-2308
cConnection Science3.200Taylor & Francis0954-0091
Computing in Science & Engineering1.800IEEE1521-9615