posted by user: peggy || 1777 views || tracked by 1 users: [display]

GSSNOA 2016 : Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

FacebookTwitterLinkedInGoogle

Link: http://computing.derby.ac.uk/gssnoa2016/
 
When Jul 1, 2016 - Feb 20, 2017
Where UK
Abstract Registration Due Aug 15, 2016
Submission Deadline Nov 30, 2016
Notification Due Jan 20, 2017
Final Version Due Feb 20, 2017
Categories    computer science   computing
 

Call For Papers

Call for Book Chapters
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

Book Title
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications
Editors
Dr. Shao Ying Zhu, University of Derby, UK
Dr. Sandra Scott-Hayward, Queen’s University Belfast, UK
Professor Richard Hill, University of Derby, UK
Dr. Ludovic Jacquin, Hewlett Packard Labs, UK

Publisher
The book will be published by Springer in the Computer Communications and Networks Series.

Theme
Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) have changed the networking industry dramatically. NFV virtualizes network services by utilizing virtualization technologies to reduce the dependency on underlying hardware. NFV provides many benefits such as faster service enablement, ease of resource management and lower OPEX and CAPEX. SDN separates the control functions from the underlying physical network by decoupling the control and data planes. SDN provides many benefits such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic and security. However, as with traditional networks, SDNFV-based networks are subject to various security threats and attacks. In this book, we invite high quality submissions in the areas of NFV and SDN security from both a technical and business perspective. Submitted chapters should highlight methods and approaches that can be used to analyse the security risks and requirements, threats and techniques related to NFV and SDN and to provide novel methods and approaches to ensure security in NFV and SDN. Proposed network security enhancements through deployment of an SDNFV network will also be welcomed. The aim of the book is to explore various security challenges and benefits of NFV and SDN and provide novel methods and approaches to ensure security in NFV and SDN-based networks.
Recommended Topics
The recommended topics include, but are not limited to, the following areas in Network Functions Virtualization (NFV) and Software-Defined Networking (SDN):
• Security challenges, opportunities and applications in SDN and NFV
• Security, privacy and applications in 5G networks, Industry 4.0 and beyond
• Security design and infrastructure of SDN and NFV
• Security policy and assurance of SDN and NFV
• Case studies of SDN and NFV applications
• Security of applying SDN to wireless and mobile networks
• Security of applying NFV and SDN to IoT
• Security of applying NFV and SDN to cloud computing
• Security of applying NFV and SDN to big data analytics
• Risk and compliance issues in SDNFV

Review process
Authors will be invited to submit a 2-3 page chapter proposal through EasyChair. The editors will review the chapter proposal and invite selected authors to submit a full version of the proposed book chapter. Each book chapter should be about 15 to 20 pages in length (excluding references). The book will have 12 to 15 chapters. The full chapters will be reviewed by a team of reviewers. Authors will be requested to make any necessary changes based on the reviews prior to final acceptance. .

Important Dates
Chapter proposal due (2-3 pages): 15 August 2016
Chapter proposal evaluation and notification: 15 September 2016
Full chapters due: 30 November 2016
Chapter evaluation and notification: 20 January 2017
Final manuscript due: 20 February 2017

Submission and Format
The chapter proposal should be submitted in MS Word (2010 or higher) or PDF format through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). The chapter proposal should contain the following;
1) Title of the proposed chapter
2) Author(s) of the chapter ( including affiliation)
3) Abstract of 500 words
4) Keywords
5) Estimated number of pages

Full book chapters will also need to be submitted through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). Full book chapters need to be formatted according to Springer’s instruction at https://www.springer.com/gp/authors-editors/book-authors-editors/manuscript-preparation/5636

Contact
For further questions please contact Shao Ying Zhu(s.y.zhu@derby.ac.uk) or Sandra Scott-Hayward (s.scott-hayward@qub.ac.uk)

------------------------------------------------------------------------------------------------------------

Related Resources

ICML 2017   34rd International Conference on Machine Learning
5G_Security 2017   Comprehensive Guide to 5G Security
IJE 2016   International Journal of Education
IEEE NFV-SDN 2016   2016 IEEE NFV-SDN -- Call for Submissions
ICMLC 2017   2017 9th International Conference on Machine Learning and Computing (ICMLC 2017)-ACM, Ei
SDNFlex 2017   Workshop on Software-Defined Networking and Network Function Virtualization for Flexible Network Management
IEEE ICECCT 2017   2017 IEEE International Conference on Electrical, Computer and Communication Technologies
EmergMediaSec 2016   Special issue on Emerging Challenges and Solutions for Multimedia Security in Advances in Multimedia journal
WPCNets 2016   IEEE WCNC'2016 Workshop on Wireless Powered Communication Networks: From Theory to Industrial Challenges
ICICA 2017   2017 International Conference on Intelligent Computing and Applications (ICICA 2017)-Scopus,EI