Special Issue on Securing of Software Defined Network Overlays

Submission Deadline: Feb. 25, 2020

Please click the link to know more about Manuscript Preparation: http://www.ijiis.net/submission

Please download to know all details of the Special Issue

Special Issue Flyer (PDF)
  • Lead Guest Editor
    • Tomonobu Sato
      Hitachi ICT Business Services, Ltd, Tokyo, Japan
  • Guest Editor
    Guest Editors play a significant role in a special issue. They maintain the quality of published research and enhance the special issue’s impact. If you would like to be a Guest Editor or recommend a colleague as a Guest Editor of this special issue, please Click here to complete the Guest Editor application.
    • Amit Tyagi
      Department of Computer Science and Engineering, Lingaya's Vidyapeeth, Faridabad, Haryana, India
    • Shumian Yang
      Shandong Computer Science Center ( National Supercomputer Center in Jinan ), Jinan, Shandong, China
  • Introduction

    Such as coding data, establishing a fire wall and doing garble prevention of the data which sends and receives a network by a bond to secure security of a network, it's the mainstream to put a security measure into effect by establishing software according to the network environment separately.Therefore advantage convenience was high by conventional technology, and it was difficult to build the network environment that high security was guaranteed easily freely.The office work person in charge and the administrator who don't have an expert knowledge of a network make the network environment a pattern by restricting practical use, and elucidate setting of a wide area network and the network technology which can be managed.1 car establishes Thurber who calls the reach of the network divided by TA and a router the segment mask which manages network information (NIF) and network access information in each segment as the management unit (segment). A record for the number of machines is registered with NIF, and mechanical equipment on the sending side can see NIF at the time of application execution and recognize the machine connected to a network on the arrival side.The IP address which is needed when connecting with a partner machine in NIF, and the machine, personal information is registered, and acquisition restriction of NIF is performed by network access information and a connection with a partner machine is restricted.

    Aims and Scope:

    1. 5G Services, Implementations and Standards
    2. Internet of Things and Big Data
    3. Network architectures and standards
    4. Social Networking and Security
    5. Cloud and Fog / Edge Computing, Networking and Storage
    6. Electronic Commerce Including Blockchain Applications and supporting

  • Guidelines for Submission

    Manuscripts can be submitted until the expiry of the deadline. Submissions must be previously unpublished and may not be under consideration elsewhere.

    Papers should be formatted according to the guidelines for authors (see: http://www.ijiis.net/submission). By submitting your manuscripts to the special issue, you are acknowledging that you accept the rules established for publication of manuscripts, including agreement to pay the Article Processing Charges for the manuscripts. Manuscripts should be submitted electronically through the online manuscript submission system at http://www.sciencepublishinggroup.com/login. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal and will be listed together on the special issue website.

  • Published Papers

    The special issue currently is open for paper submission. Potential authors are humbly requested to submit an electronic copy of their complete manuscript by clicking here.