Hardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The International Symposium on Future Cyber Security Technologies (FCST) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.
The FCST 2025 symposium addresses the use of advanced intelligent systems in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G, SDN and many others . We are mainly interested in receiving state of the art work on different aspect of future cyber security management system, security and privacy, cloud computing and big data supported security systems to mention but few.
- Cyber Security Techniques Architectures and Design
- Cyber Security Systems
- Cyber Security Techniques Integration
- Cyber Security Techniques Orchestration
- Network forensics using intelligent systems and data analytics
- Cyber Security Techniques Based Network Control plane design
- Cyber Security Techniques for Cloud based DataCenter
- Cyber Security Techniques for 5G Networks
- Adversarial Machine learning and Backdoor Attacks
- Blockchain Systems for Cyber Security
- Cyber Security Techniques for Internet of Things (IoT)
- Cyber Security Techniques Based NetworkData plane design
- Cyber Security Techniques Performance Management
Submission Site:
Organization Committee
- Izzat Alsmadi, Texas A&M University-San Antonio, USA.
- Yunpeng (Jack) Zhang, University of Houston, USA
- Abdallah Khreishah, New Jersey Institute of Technology, USA
- Issa Khalil, Qatar Foundation, Qatar
KEYNOTE SPEAKERS
ICSC2025 Keynote at https://www.icsc-conference.org/2025/keynote.php
Authors Submission Guidelines:
Submission Site:
https://easychair.org/conferences/?conf=icsc20250
Paper format
Submitted papers (.pdf format) must use the A4 IEEE Manuscript Templates for Conference Proceedings. Please remember to add Keywords to your submission.
Length
Submitted papers may be 6 to 8 pages. Up to two additional pages may be added for references. The reference pages must only contain references. Overlength papers will be rejected without review.
Originality
Papers submitted to FCST must be the original work of the authors. The may not be simultaneously under review elsewhere. Publications that have been peer-reviewed and have appeared at other conferences or workshops may not be submitted to FCST. Authors should be aware that IEEE has a strict policy with regard to plagiarism https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html The authors' prior work must be cited appropriately.
Author list
Please ensure that you submit your papers with the full and final list of authors in the correct order. The author list registered for each submission is not allowed to be changed in any way after the paper submission deadline.
Proofreading:
Please proofread your submission carefully. It is essential that the language use in the paper is clear and correct so that it is easily understandable. (Either US English or UK English spelling conventions are acceptable.)
Publication:
All accepted papers in FCST2025 and the workshops colocated with it will be submitted to IEEEXplore for possible publication.
Program
The program will be announced with the ICSC2025 program at https://www.icsc-conference.org/2025/program.php
Venue
For venue and acomodoation information, please visit https://www.icsc-conference.org/2025/venue.php
Registration
For registration information, please visit https://www.icsc-conference.org/2025/registration.php
Camera Ready
For Camera Ready information, please visit https://www.icsc-conference.org/2025/cameraready.php