posted by user: peggy || 3830 views || tracked by 1 users: [display]

GSSNOA 2016 : Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

FacebookTwitterLinkedInGoogle

Link: http://computing.derby.ac.uk/gssnoa2016/
 
When Jul 1, 2016 - Feb 20, 2017
Where UK
Abstract Registration Due Aug 15, 2016
Submission Deadline Nov 30, 2016
Notification Due Jan 20, 2017
Final Version Due Feb 20, 2017
Categories    computer science   computing
 

Call For Papers

Call for Book Chapters
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

Book Title
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications
Editors
Dr. Shao Ying Zhu, University of Derby, UK
Dr. Sandra Scott-Hayward, Queen’s University Belfast, UK
Professor Richard Hill, University of Derby, UK
Dr. Ludovic Jacquin, Hewlett Packard Labs, UK

Publisher
The book will be published by Springer in the Computer Communications and Networks Series.

Theme
Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) have changed the networking industry dramatically. NFV virtualizes network services by utilizing virtualization technologies to reduce the dependency on underlying hardware. NFV provides many benefits such as faster service enablement, ease of resource management and lower OPEX and CAPEX. SDN separates the control functions from the underlying physical network by decoupling the control and data planes. SDN provides many benefits such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic and security. However, as with traditional networks, SDNFV-based networks are subject to various security threats and attacks. In this book, we invite high quality submissions in the areas of NFV and SDN security from both a technical and business perspective. Submitted chapters should highlight methods and approaches that can be used to analyse the security risks and requirements, threats and techniques related to NFV and SDN and to provide novel methods and approaches to ensure security in NFV and SDN. Proposed network security enhancements through deployment of an SDNFV network will also be welcomed. The aim of the book is to explore various security challenges and benefits of NFV and SDN and provide novel methods and approaches to ensure security in NFV and SDN-based networks.
Recommended Topics
The recommended topics include, but are not limited to, the following areas in Network Functions Virtualization (NFV) and Software-Defined Networking (SDN):
• Security challenges, opportunities and applications in SDN and NFV
• Security, privacy and applications in 5G networks, Industry 4.0 and beyond
• Security design and infrastructure of SDN and NFV
• Security policy and assurance of SDN and NFV
• Case studies of SDN and NFV applications
• Security of applying SDN to wireless and mobile networks
• Security of applying NFV and SDN to IoT
• Security of applying NFV and SDN to cloud computing
• Security of applying NFV and SDN to big data analytics
• Risk and compliance issues in SDNFV

Review process
Authors will be invited to submit a 2-3 page chapter proposal through EasyChair. The editors will review the chapter proposal and invite selected authors to submit a full version of the proposed book chapter. Each book chapter should be about 15 to 20 pages in length (excluding references). The book will have 12 to 15 chapters. The full chapters will be reviewed by a team of reviewers. Authors will be requested to make any necessary changes based on the reviews prior to final acceptance. .

Important Dates
Chapter proposal due (2-3 pages): 15 August 2016
Chapter proposal evaluation and notification: 15 September 2016
Full chapters due: 30 November 2016
Chapter evaluation and notification: 20 January 2017
Final manuscript due: 20 February 2017

Submission and Format
The chapter proposal should be submitted in MS Word (2010 or higher) or PDF format through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). The chapter proposal should contain the following;
1) Title of the proposed chapter
2) Author(s) of the chapter ( including affiliation)
3) Abstract of 500 words
4) Keywords
5) Estimated number of pages

Full book chapters will also need to be submitted through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). Full book chapters need to be formatted according to Springer’s instruction at https://www.springer.com/gp/authors-editors/book-authors-editors/manuscript-preparation/5636

Contact
For further questions please contact Shao Ying Zhu(s.y.zhu@derby.ac.uk) or Sandra Scott-Hayward (s.scott-hayward@qub.ac.uk)

------------------------------------------------------------------------------------------------------------

Related Resources

NSDI 2020   The 17th USENIX Symposium on Networked Systems Design and Implementation
ICDMML 2020   【EI SCOPUS】2020 International Conference on Data Mining and Machine Learning
IJCNC 2019   SI - Applied Soft Computing in Computer Networking: Potentials & Challenges
ACM-ACAI-Ei/Scopus 2019   2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence
NetSoft 2020   IEEE Conference on Network Softwarization 2020
CVPR 2020   Computer Vision and Pattern Recognition
AEBS 2019   2nd International Conference on Practical Approaches to address Economic Issues, Business & Social Sciences Challenges
ACM--ICMLC--Ei and Scopus 2020   ACM--2020 12th International Conference on Machine Learning and Computing (ICMLC 2020)--SCOPUS, Ei Compendex
MAPD 2020   Multidisciplinary Approaches to Political Discourse #3: Responding to new challenges 25-26 June 2020 University of Liverpool
Energy Solutions to Sustainable Systems 2020   Intelligent Energy Solutions to Sustainable Systems- New Directions, Challenges and Applications