International Symposium on Future Cyber Security Technologies (FCST) 2018

Hardware systems and Software applications continue to evolve with more functionalities, complex structures and interactions between them and with users. Cyber Security risks continue to evolve as well in both quantity in the same domains as well new types and ways on how to break into computing systems, software applications, websites, databases, programmable networks etc. For example, monitoring the car manufacturing industry, we can see that recent car models have more complex hardware components and automated programmable features in comparison with their earlier models, this will increase the risk associated with protecting such systems. Same thing can be applicable to most other engineering products. Such complex hardware and programmable techniques bring security opportunities to change the way cyber security controls (e.g. firewalls, Intrusion Detection Systems (IDS), etc.) are developed and enforced. They also bring security challenges related to our computing systems and software architectures or any changes that can be directly or indirectly related to them due to the complex interactions between them. The 1st International Symposium on Future Cyber Security Technologies (FCST 2018) will focus on issues related to future cyber security challenges as well as opportunities which mainly highlight the above mentioned aspects.

The 1st IEEE International Symposium on Future Cyber Security Technologies (FCST 2018) will be a forum for scientists, researchers, students, and practitioners to present their latest research results, ideas, developments, and applications in the areas of cyber security techniques, security challenges and opportunities for emerging technologies such as cloud computing, Internet of Things (IoT) and Edge Computing,big data, 5G, SDN and many others .

The topics of interest for this workshop include, but are not limited to:

  • Cyber Security Techniques Architectures and Design
  • Cyber Security Systems
  • Cyber Security Techniques Integration
  • Cyber Security Techniques Orchestration
  • Cyber Security Techniques Based Network Control plane design
  • Cyber Security Techniques Based NetworkData plane design
  • Cyber Security Techniques Performance Management
  • Cyber Security Techniques for Cloud based DataCenter
  • Cyber Security Techniques for 5G Networks
  • Cyber Security Techniques for Internet of Things (IoT)
  • Cyber Security Techniques for Big Data Computing
  • Cyber Security Techniques for large scale storage system
  • Hardware system design for Cyber Security Techniques/li>
  • Cyber Security Techniques management
  • Radio Access Network virtualization
  • Cyber Security Techniques for programmable Networks
  • Cyber Security Techniques for Edge and Fog Computing
  • Cyber Security Techniques Cloud Computing
  • Cyber Security Techniques for Software Defined Network (SDN)
  • Cyber Security Techniques Network Function Virtualization (NFV)
  • Cyber Security Techniques Case studies

Date

15 - 18 Oct 2018
Expired!

Interested?

Read More

Labels

Conference,
Europe 2018,
Event,
Privacy

Location

Valencia
Valencia, Spain
REGISTER
Go to Top