International Journal of Intelligent Information Systems

Special Issue

Securing of Software Defined Network Overlays

  • Submission Deadline: Feb. 25, 2020
  • Status: Submission Closed
  • Lead Guest Editor: Tomonobu Sato
About This Special Issue
Such as coding data, establishing a fire wall and doing garble prevention of the data which sends and receives a network by a bond to secure security of a network, it's the mainstream to put a security measure into effect by establishing software according to the network environment separately.Therefore advantage convenience was high by conventional technology, and it was difficult to build the network environment that high security was guaranteed easily freely.The office work person in charge and the administrator who don't have an expert knowledge of a network make the network environment a pattern by restricting practical use, and elucidate setting of a wide area network and the network technology which can be managed.1 car establishes Thurber who calls the reach of the network divided by TA and a router the segment mask which manages network information (NIF) and network access information in each segment as the management unit (segment). A record for the number of machines is registered with NIF, and mechanical equipment on the sending side can see NIF at the time of application execution and recognize the machine connected to a network on the arrival side.The IP address which is needed when connecting with a partner machine in NIF, and the machine, personal information is registered, and acquisition restriction of NIF is performed by network access information and a connection with a partner machine is restricted.

Aims and Scope:

  1. 5G Services, Implementations and Standards
  2. Internet of Things and Big Data
  3. Network architectures and standards
  4. Social Networking and Security
  5. Cloud and Fog / Edge Computing, Networking and Storage
  6. Electronic Commerce Including Blockchain Applications and supporting
Lead Guest Editor
  • Tomonobu Sato

    Hitachi ICT Business Services, Ltd, Tokyo, Japan

Guest Editors
  • Shumian Yang

    Shandong Computer Science Center ( National Supercomputer Center in Jinan ), Jinan, China

  • Amit Tyagi

    Department of Computer Science and Engineering, Lingaya's Vidyapeeth, Faridabad, India

Published Articles
  • Modeling and Simulation on Securing of Software Defined Network Overlays

    Tomonobu Sato

    Issue: Volume 8, Issue 4, August 2019
    Pages: 65-76
    Received: Jul. 15, 2019
    Accepted: Sep. 17, 2019
    Published: Oct. 30, 2019
    DOI: 10.11648/j.ijiis.20190804.11
    Downloads:
    Views:
    Abstract: Security is one of the key technologies with which DX (Digital Transformation) supported. A sent data was sometimes noise for this nonlinear programming technique to have the restrictions which won't be more than 1 for the value of the amplified bit, without the most suitable functions can be found. It wasn't possible to build the large-scale netwo... Show More