Skip to Main Content Area
  • CPS-VO
    • Contact Support
      
 
Not a member?
Click here to register!
Forgot username or password?
 
logo
Cyber-Physical Security
  • Home
  • Calendar
  • Members
  • Forums
  • Files
CPS-VO

Visible to the public Call for Book Chapters-Guide to Security in SDN and NFV - Challenges, Opportunities, and ApplicationsConflict Detection Enabled

  • View
    No replies
    Wed, 07/06/2016 - 2:23pm
    Anonymous
    Anonymous's picture

    Call for Book Chapters

    Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

    Book Title

    Guide to Security in SDN and NFV - Challenges, Opportunities, and Applications

    Editors

    • Dr. Shao Ying Zhu, University of Derby, UK
    • Dr. Sandra Scott-Hayward, Queen's University Belfast, UK
    • Professor Richard Hill, University of Derby, UK
    • Dr. Ludovic Jacquin, Hewlett Packard Labs, UK

    Publisher

    The book will be published by Springer in the Computer Communications and Networks Series.

    Theme

    Network Functions Virtualization (NFV) and Software-Defined Networking (SDN) have changed the networking industry dramatically. NFV virtualizes network services by utilizing virtualization technologies to reduce the dependency on underlying hardware. NFV provides many benefits such as faster service enablement, ease of resource management and lower OPEX and CAPEX. SDN separates the control functions from the underlying physical network by decoupling the control and data planes. SDN provides many benefits such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic and security. However, as with traditional networks, SDNFV-based networks are subject to various security threats and attacks. In this book, we invite high quality submissions in the areas of NFV and SDN security from both a technical and business perspective. Submitted chapters should highlight methods and approaches that can be used to analyse the security risks and requirements, threats and techniques related to NFV and SDN and to provide novel methods and approaches to ensure security in NFV and SDN. Proposed network security enhancements through deployment of an SDNFV network will also be welcomed. The aim of the book is to explore various security challenges and benefits of NFV and SDN and provide novel methods and approaches to ensure security in NFV and SDN-based networks.

    Recommended Topics

    The recommended topics include, but are not limited to, the following areas in Network Functions Virtualization (NFV) and Software-Defined Networking (SDN):

    • Security challenges, opportunities and applications in SDN and NFV
    • Security, privacy and applications in 5G networks, Industry 4.0 and beyond
    • Security design and infrastructure of SDN and NFV
    • Security policy and assurance of SDN and NFV
    • Case studies of SDN and NFV applications
    • Security of applying SDN to wireless and mobile networks
    • Security of applying NFV and SDN to IoT
    • Security of applying NFV and SDN to cloud computing
    • Security of applying NFV and SDN to big data analytics
    • Risk and compliance issues in SDNFV

    Review process

    Authors will be invited to submit a 2-3 page chapter proposal through EasyChair. The editors will review the chapter proposal and invite selected authors to submit a full version of the proposed book chapter. Each book chapter should be about 15 to 20 pages in length (excluding references). The book will have 12 to 15 chapters. The full chapters will be reviewed by a team of reviewers. Authors will be requested to make any necessary changes based on the reviews prior to final acceptance. .

    Important Dates

    • Chapter proposal due (2-3 pages): 15 August 2016
    • Chapter proposal evaluation and notification: 15 September 2016
    • Full chapters due: 30 November 2016
    • Chapter evaluation and notification: 20 January 2017
    • Final manuscript due: 20 February 2017

    Submission and Format

    The chapter proposal should be submitted in MS Word (2010 or higher) or PDF format through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). The chapter proposal should contain the following;

    • Title of the proposed chapter
    • Author(s) of the chapter ( including affiliation)
    • Abstract of 500 words
    • Keywords
    • Estimated number of pages

    Full book chapters will also need to be submitted through EasyChair (https://easychair.org/conferences/?conf=gssnoa2016). Full book chapters need to be formatted according to Springer's instruction at https://www.springer.com/gp/authors-editors/book-authors-editors/manuscript-preparation/5636

    Contact

    For further questions please contact Shao Ying Zhu or Sandra Scott-Hayward

    ‹ CFP International Workshop on Cloud Computing and IoT Applications and Security (CIAS2016) CfP: Protecting the Future: International Conference of Cyber Conflict (CyCon U.S.) ›
    Top
    • PDF version
    • Printer-friendly version

    Terms of Use  |  ©2023. CPS-VO