About the Journal

This journal is published in collaboration with the iCatse organization: www.icatse.org

Aims & Scope

Software defined networking(SDN) and network functions virtualization (NFV) technologies have received significant attention over the last few years. In contrast to traditional networks, SDN decouples the control and data planes through an open and standard interface to enhance programmability and flexibility of carrier grade networks.

SDN is complementary technology to NFV for achieving unified network abstraction and suitable for managing connectivity because the controller has a global view of the network. SDN plays major role in the infrastructure of NFV. However, networks built using SDN and NFV approaches are expected to face several challenges such as scalability, robustness and resiliency. 

The primary objective is to publish a high-quality journal with free Internet-based access for researchers and other interested people throughout the world. Papers published by the journal represent important advances of significance to experts within these fields. Our aim is to encourage scientists to publish their experimental and theoretical results in as much detail as possible. There is no restriction on the length of the papers.

Topics covered include, but are not limited to:

  • A. Software defined networking(SDN) and network functions virtualization (NFV) technologies
    • 1. Advancement in SDN technology
      • SDN & Virtualization architectures, Advanced SDN services & validation, Service chaining & orchestration
      • New controller architectures, Security & management on SDN, Experimentation & deployments
    • 2. SDN and NFV
      • NFV and SDN, Advances NFV infrastructure, NFV management & orchestration
      • NFV Software architecture, Reliability and availability, Integration of SDN and NFV
    • 3. Interworking with legacy networks, Application & management of SDN/NFV
      • SDN architectures, Experimentation deployments, Management architecture for SDN/ NFV
  • B. Artificial Intelligence and Internet of Things
    • 4. Artificial Intelligence
      • AI for Software Engineering, Artificial Intelligence tools and Applications, Knowledge-based Systems, modelling-identification and control of robotic systems, wireless and Mobile sensor networks for robot navigation
    • 5. Internet of Things
      • Mobile IoT, IoT device or circuit design, IoT applications and services, IoT analytics, IoT architecture Knowledge representation in IoT, IoT for Big data, IoT and Robotics, IoT for smart grids, Case studies and evaluations for IoT
    • 6. Software Engineering and Knowledge Engineering
      • Distributed Object-Oriented Systems, Reusable Object-Oriented Architectures and Applications, Safety and Security Critical Software, Development and Maintenance, Software Maintenance and Evaluation, Knowledge Acquisition, Data Warehousing and Data Mining, Knowledge-Based and Expert Systems, Knowledge Representation and Retrieval, Knowledge Engineering Tools and Techniques, Time and Knowledge Management Tools, Knowledge Visualization, Knowledge reengineering, Decision Support Systems, Expert Systems
  • C. Mobile and Wireless Communications.
    • 7. Mobile, Wireless Networks and Applications
      • Mobile & wireless communications, Mobility protocols, Mobile sensing, Mobile performance evaluation, Vehicular ad hoc network (VANET), Mobile ad hoc network (MANET), Wireless ad hoc network (WANET), Wireless telecommunications networks, Wireless application protocols (WAP), Cellular wireless systems, Testing and monitoring of mobile applications, Fault tolerance of mobile services, Mobile content delivery networks, Software engineering for wireless sensor networks, Sensor network applications, Cognitive sensor networks, Software engineering for wireless sensor networks
      • 8. Security in Mobile and Wireless
        • Mobile malware security, Mobile platform security, Mobile network fraud, Mobile network security, NFC and smart payment applications, GPS-based security, Security for mobile sensing, Security for mobile sensor networks, Bluetooth and RFID Security, Privacy in Wireless Communications, Mobile Applications Control, Privacy-Preserving Protocols, Vehicular Networks Security, Software Vulnerabilities, Access Control/Threat Awareness, Physical Tracking Security
      • 9. Mobile Data Management & Applications
        • Performance in data management, Reliability in data management, Configuration management, Mobile device management, Mobility modelling and management, Reasoning in mobile environments, Mobile performance management, Mobile Data mining, Mobile Data streaming, Mobile Data replication, Mobile Data migration, Mobile Data models, Mobile Data architectures, Managing pervasive data for mobile, Mobile Query Processing, Mobile Data integration, Operational management for mobile services, Operational models for mobile services, Capacity management for mobile services, Capacity research for mobile services, Mobile workflows in mobile services, Mobile transactions in mobile services, Capacity management for mobile services, Capacity research for mobile services
      • 10. Mobile Software
        • Mobile website design, Ux mobile design, Software for mobile web, Software for smart devices, Software for mobile embedded platforms, Modelling of mobile systems, Mobile application development, Mobile requirements analysis and design, Mobile software testing and evaluation
  • D. Convergence Security
    • Physical and Information Security
    • Vehicular Networks Security
    • Aviation Networks Security
    • Maritime Networks Security
    • Smart Home Security
    • IoT Security
    • Smart Grid Security
    • Healthcare Security
    • Infrastructure Security

The address of the iCatse organization
-3001, Intellige 2,
Jeonja-dong, Bundang-gu,
Seongnam-si, Gyenggi-do,
South Korea (463-841)

 This is an Open Access journal, and conform our Open Access policy authors will be charged an Article Processing Charge of EUR 500 after their article is submitted and reviewed, and if it is accepted. All Open Access articles are published and distributed under the Creative Commons Attribution-Non Commercial 4.0 International (CC BY-NC 4.0). 

Authors may apply for a waiver on the Article Processing Charge, for this please contact info@riverpublishers.com