posted by user: peggy || 4484 views || tracked by 1 users: [display]

GSSNOA 2016 : Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

FacebookTwitterLinkedInGoogle

Link: http://computing.derby.ac.uk/gssnoa2016/
 
When Jul 1, 2016 - Feb 20, 2017
Where UK
Abstract Registration Due Aug 15, 2016
Submission Deadline Nov 30, 2016
Notification Due Jan 20, 2017
Final Version Due Feb 20, 2017
Categories    computer science   computing
 

Call For Papers

Call for Book Chapters
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

Book Title
Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications
Editors
Dr. Shao Ying Zhu, University of Derby, UK
Dr. Sandra Scott-Hayward, Queen’s University Belfast, UK
Professor Richard Hill, University of Derby, UK
Dr. Ludovic Jacquin, Hewlett Packard Labs, UK

Publisher
The book will be published by Springer in the Computer Communications and Networks Series.

Theme
Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) have changed the networking industry dramatically. NFV virtualizes network services by utilizing virtualization technologies to reduce the dependency on underlying hardware. NFV provides many benefits such as faster service enablement, ease of resource management and lower OPEX and CAPEX. SDN separates the control functions from the underlying physical network by decoupling the control and data planes. SDN provides many benefits such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic and security. However, as with traditional networks, SDNFV-based networks are subject to various security threats and attacks. In this book, we invite high quality submissions in the areas of NFV and SDN security from both a technical and business perspective. Submitted chapters should highlight methods and approaches that can be used to analyse the security risks and requirements, threats and techniques related to NFV and SDN and to provide novel methods and approaches to ensure security in NFV and SDN. Proposed network security enhancements through deployment of an SDNFV network will also be welcomed. The aim of the book is to explore various security challenges and benefits of NFV and SDN and provide novel methods and approaches to ensure security in NFV and SDN-based networks.
Recommended Topics
The recommended topics include, but are not limited to, the following areas in Network Functions Virtualization (NFV) and Software-Defined Networking (SDN):
• Security challenges, opportunities and applications in SDN and NFV
• Security, privacy and applications in 5G networks, Industry 4.0 and beyond
• Security design and infrastructure of SDN and NFV
• Security policy and assurance of SDN and NFV
• Case studies of SDN and NFV applications
• Security of applying SDN to wireless and mobile networks
• Security of applying NFV and SDN to IoT
• Security of applying NFV and SDN to cloud computing
• Security of applying NFV and SDN to big data analytics
• Risk and compliance issues in SDNFV

Review process
Authors will be invited to submit a 2-3 page chapter proposal through EasyChair. The editors will review the chapter proposal and invite selected authors to submit a full version of the proposed book chapter. Each book chapter should be about 15 to 20 pages in length (excluding references). The book will have 12 to 15 chapters. The full chapters will be reviewed by a team of reviewers. Authors will be requested to make any necessary changes based on the reviews prior to final acceptance. .

Important Dates
Chapter proposal due (2-3 pages): 15 August 2016
Chapter proposal evaluation and notification: 15 September 2016
Full chapters due: 30 November 2016
Chapter evaluation and notification: 20 January 2017
Final manuscript due: 20 February 2017

Submission and Format
The chapter proposal should be submitted in MS Word (2010 or higher) or PDF format through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). The chapter proposal should contain the following;
1) Title of the proposed chapter
2) Author(s) of the chapter ( including affiliation)
3) Abstract of 500 words
4) Keywords
5) Estimated number of pages

Full book chapters will also need to be submitted through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). Full book chapters need to be formatted according to Springer’s instruction at https://www.springer.com/gp/authors-editors/book-authors-editors/manuscript-preparation/5636

Contact
For further questions please contact Shao Ying Zhu(s.y.zhu@derby.ac.uk) or Sandra Scott-Hayward (s.scott-hayward@qub.ac.uk)

------------------------------------------------------------------------------------------------------------

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ACM-Ei/Scopus-CCISS 2024   2024 International Conference on Computing, Information Science and System (CCISS 2024)
CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
CTISC 2024   2024 6th International Conference on Advances in Computer Technology, Information Science and Communications (CTISC 2024) -EI Compendex
Call for Chapters - CRC Press 2024   Internet of Things: Challenges and Advances
CVIV 2024   2024 6th International Conference on Advances in Computer Vision, Image and Virtualization (CVIV 2024) -EI Compendex
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
MLANN 2024   2024 2nd Asia Conference on Machine Learning, Algorithms and Neural Networks (MLANN 2024)
RCIS 2024   18th Research Challenges in Information Science
CCVPR 2024   2024 International Joint Conference on Computer Vision and Pattern Recognition (CCVPR 2024)