<div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr">



















<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span>[Apologies if you
got multiple copies of this invitation]<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span><span> </span></span></p>

<p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:20pt">The 8th
International Symposium on Future Cyber Security Technologies (FCST 2025)<span></span></span></p>

<p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><a href="https://icsc-conference.org/2025/Workshops/BCAT2025/" style="color:blue;text-decoration:underline" target="_blank"><span style="font-size:13.5pt">https://icsc-conference.org/2025/Workshops/BCAT2025/</span></a><u><span style="font-size:13.5pt;color:blue"><span></span></span></u></p>

<p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;color:red">Hybrid Event</span><span style="font-size:12pt"><span></span></span></p>

<p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;background:white;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:black">Tampa, Florida, USA. May 19-22, 2025</span><span style="font-size:12pt;font-family:"Times New Roman",serif"><span></span></span></p>

<p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:18pt">Co-located with<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:10pt"><span> </span></span></p>

<p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><a href="https://www.icsc-conference.org/2025/" style="color:blue;text-decoration:underline" target="_blank"><span style="font-size:16pt">The
Fifth IEEE Intelligent Cybersecurity Conference (ICSC2025)</span></a><span style="font-size:8pt"><span></span></span></p>

<p class="MsoNormal" align="center" style="margin:0in 0in 0.0001pt;text-align:center;line-height:normal;background:white;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;font-family:"Times New Roman",serif;color:red">Technically Co-Sponsored by IEEE Florida West
Coast Section<span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:14pt;font-family:"Times New Roman",serif">FCST 2025 CFP:</span></u></b><span><span></span></span></p>

<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Hardware systems and Software applications
continue to evolve with more functionalities, complex structures and
interactions between them and with users. Cyber Security risks continue to
evolve as well in both quantity in the same domains as well new types and ways
on how to break into computing systems, software applications, websites,
databases, programmable networks etc. For example, monitoring the car
manufacturing industry, we can see that recent car models have more complex
hardware components and automated programmable features in comparison with
their earlier models, this will increase the risk associated with protecting
such systems. Same thing can be applicable to most other engineering products.
Such complex hardware and programmable techniques bring security opportunities
to change the way cyber security controls (e.g. firewalls, Intrusion Detection
Systems (IDS), etc.) are developed and enforced. They also bring security
challenges related to our computing systems and software architectures or any
changes that can be directly or indirectly related to them due to the complex
interactions between them. The International Symposium on Future Cyber Security
Technologies (FCST) will focus on issues related to future cyber security
challenges as well as opportunities which mainly highlight the above mentioned
aspects. <span></span></span></p>

<p class="MsoNormal" style="text-align:justify;line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>The FCST 2025 symposium addresses the use of
advanced intelligent systems in the areas of cyber security techniques,
security challenges and opportunities for emerging technologies such as cloud
computing, Internet of Things (IoT) and Edge Computing, big data, 5G, SDN and
many others . We are mainly interested in receiving state of the art work on
different aspect of future cyber security management system, security and
privacy, cloud computing and big data supported security systems to mention but
few.<span></span></span></p>

<ul type="disc" style="margin-bottom:0in"><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques Architectures and Design<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Systems<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques Integration<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques Orchestration<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Network
     forensics using intelligent systems and data analytics<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques Based Network Control plane design<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques for Cloud based DataCenter<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques for 5G Networks<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Adversarial Machine
     learning and Backdoor Attacks<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Blockchain
     Systems for Cyber Security<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques for Internet of Things (IoT)<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques Based Network Data plane design<span></span></span></li><li class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span>Cyber Security
     Techniques Performance Management<span></span></span></li></ul>

<p class="MsoNormal" style="line-height:normal;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Times New Roman",serif">  </span><b><u><span style="font-size:12pt;font-family:"Times New Roman",serif">Submissions Guidelines and Proceedings</span></u></b><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 12pt;text-align:justify;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span>Manuscripts should
be prepared in 10-point font using the IEEE 8.5" x 11" two-column
format. All papers should be in PDF format, and submitted electronically at
Paper Submission Link. A full paper can be up to 6 pages (including all
figures, tables and references). Submitted papers must present original
unpublished research that is not currently under review for any other
conference or journal. Papers not following these guidelines may be rejected
without review. Also submissions received after the due date, exceeding length
limit, or not appropriately structured may also not be considered. Authors may
contact the Program Chair for further information or clarification. All
submissions are peer-reviewed by at least three reviewers. Accepted papers will
appear in the ICSC Proceeding, and be published by the IEEE Computer Society
Conference Publishing Services and be submitted to IEEE Xplore for inclusion. <br>
<br>
</span><u><span style="font-size:13.5pt;line-height:105%;font-family:"Calibri Light",sans-serif;color:black">Important Dates:</span></u><span><span></span></span></p>

<ul style="margin-top:0in;margin-bottom:0in" type="disc"><li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><b><span style="font-size:14pt;font-family:"Calibri Light",sans-serif;color:red">Paper submission deadline: March 23rd 2025 (Firm
     and Final)</span></b><span><span></span></span></li><li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Notification of acceptance: April 7th, 2025 </span><span><span></span></span></li><li class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:normal;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:14pt;font-family:"Calibri Light",sans-serif">Camera-ready Submission: April 21st, 2025</span><span><span></span></span></li></ul>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-family:"Calibri Light",sans-serif"> </span><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><b><u><span style="font-size:12pt;line-height:105%;font-family:"Calibri Light",sans-serif">Contact:</span></u></b><span><span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span><span> </span></span></p>

<p class="MsoNormal" style="margin:0in 0in 0.0001pt;line-height:105%;font-size:11pt;font-family:"Calibri",sans-serif"><span style="font-size:13.5pt;line-height:105%">Please send any inquiry on ICSC to Fahed
Alkhabbas at: </span><a href="mailto:fahed.alkhabbas@mau.se" style="color:blue;text-decoration:underline" target="_blank"><span style="font-size:13.5pt;line-height:105%">fahed.alkhabbas@mau.se</span></a><span style="font-size:13.5pt;line-height:105%"> </span><span><span></span></span></p>

<p class="MsoNormal" style="line-height:106%;margin:0in 0in 8pt;font-size:11pt;font-family:"Calibri",sans-serif"><span> <span></span></span></p>

<p class="MsoNormal" style="margin:0in 0in 8pt;line-height:107%;font-size:11pt;font-family:"Calibri",sans-serif"><span> </span></p>





</div>
</div>
</div>
</div>