{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:46:33Z","timestamp":1743144393912,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":51,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_32","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"515-535","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Issues and Challenges in SDN"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-6110","authenticated-orcid":false,"given":"Ali Haider","family":"Shamsan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7672-0790","authenticated-orcid":false,"given":"Arman Rasool","family":"Faridi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"32_CR1","unstructured":"Imran, A.: SDN controllers security issues, ayesha. Master thesis, University of Jyv\u00e4skyl\u00e4 (2017)"},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16, 1617\u20131634 (2014). https:\/\/doi.org\/10.1109\/SURV.2014.012214.00180","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"7373","DOI":"10.1109\/JSEN.2016.2581491","volume":"16","author":"J Wan","year":"2016","unstructured":"Wan, J., et al.: Software-defined industrial internet of things in the context of industry 4.0. IEEE Sens. J. 16, 7373\u20137380 (2016)","journal-title":"IEEE Sens. J."},{"issue":"5","key":"32_CR4","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1007\/s11036-016-0676-x","volume":"21","author":"Z Shu","year":"2016","unstructured":"Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M.: Security in software-defined networking: threats and countermeasures. Mob. Netw. Appl. 21(5), 764\u2013776 (2016). https:\/\/doi.org\/10.1007\/s11036-016-0676-x","journal-title":"Mob. Netw. Appl."},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.cose.2018.07.010","volume":"78","author":"BK Tripathy","year":"2018","unstructured":"Tripathy, B.K., Das, D.P., Jena, S.K., Bera, P.: Risk based security enforcement in software defined network. Comput. Secur. 78, 321\u2013335 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.07.010","journal-title":"Comput. Secur."},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Ageyev, D., Bondarenko, O., Alfroukh, W., Radivilova, T.: Provision security in SDN\/NFV. In: 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), pp. 506\u2013509. IEEE (2018)","DOI":"10.1109\/TCSET.2018.8336252"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","volume":"51","author":"S Sezer","year":"2013","unstructured":"Sezer, S., Scott-Hayward, S., Kaur, P.: Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Commun. Mag. 51, 36\u201343 (2013). https:\/\/doi.org\/10.1109\/MCOM.2013.6553676","journal-title":"IEEE Commun. Mag."},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Kaur, R., Singh, A., Singh, S., Sharma, S.: Security of software defined networks: taxonomic modeling, key components and open research area. IEEE IInternational Conference Electrical, Electronics, and Optimization Techniques, pp. 2832\u20132839 (2016)","DOI":"10.1109\/ICEEOT.2016.7755214"},{"key":"32_CR9","doi-asserted-by":"publisher","unstructured":"Hussein, A., Elhajj, I.H., Chehab, A., Kayssi, A.: SDN security plane: an architecture for resilient security services. In: Proceedings - 2016 IEEE International Conference on Cloud Engineering Workshop, IC2EW 2016, pp. 54\u201359 (2016). https:\/\/doi.org\/10.1109\/IC2EW.2016.15","DOI":"10.1109\/IC2EW.2016.15"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MSP.2017.46","volume":"15","author":"MC Dacier","year":"2017","unstructured":"Dacier, M.C., K\u00f6nig, H., Cwalinsk, R., Kargl, F., Dietrich, S.: Security challenges and opportunities of software-defined networking. IEEE Secur. Priv. 15, 96\u2013100 (2017). https:\/\/doi.org\/10.1109\/MSP.2017.46","journal-title":"IEEE Secur. Priv."},{"key":"32_CR11","doi-asserted-by":"publisher","unstructured":"Scott-Hayward, S.: Design and deployment of secure, robust, and resilient SDN controllers. In: Proceedings of 2015 1st IEEE Conference on Network Softwarization, pp. 1\u20135 (2015). https:\/\/doi.org\/10.1109\/NETSOFT.2015.7258233","DOI":"10.1109\/NETSOFT.2015.7258233"},{"key":"32_CR12","doi-asserted-by":"publisher","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., Sezer, S.: SDN security: a survey. In: SDN4FNS 2013 - 2013 Working on Software Defined Networks Future Networks and Services (2013). https:\/\/doi.org\/10.1109\/SDN4FNS.2013.6702553","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Poddar, R., Mahajan, K., Mann, V.: S PHINX: detecting security attacks in software-defined networks. In: NDSS 2015, pp. 8\u201311 (2015). http:\/\/dx.doi.org\/10.14722\/ndss.2015.23064","DOI":"10.14722\/ndss.2015.23064"},{"key":"32_CR14","doi-asserted-by":"publisher","unstructured":"Patil, V., Patil, C., Awale, R.N.: Security challenges in software defined network and their solutions. In: 2017 8th International Conference on Computing, Communication and Networking Technologies, pp. 1\u20135 (2017). https:\/\/doi.org\/10.1109\/ICCCNT.2017.8203978","DOI":"10.1109\/ICCCNT.2017.8203978"},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2015.7081073","volume":"53","author":"A Akhunzada","year":"2015","unstructured":"Akhunzada, A., Ahmed, E., Gani, A., Khan, M.K., Imran, M., Guizani, S.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53, 36\u201344 (2015). https:\/\/doi.org\/10.1109\/MCOM.2015.7081073","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"32_CR16","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1107\/S0567739470000293","volume":"18","author":"S Scott-Hayward","year":"2016","unstructured":"Scott-Hayward, S., Natarajan, S., Sezer, S.: A survey of security in software defined networks. IEEE Commun. Surv. Tutor. 18(1), 623\u2013654 (2016). https:\/\/doi.org\/10.1107\/S0567739470000293","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"32_CR17","doi-asserted-by":"publisher","unstructured":"Kreutz, D., Ramos, F.M.V., Ver\u00edssimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking\u202f: a comprehensive survey. 103 (2015). https:\/\/doi.org\/10.1109\/JPROC.2014.2371999","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F.M.V., Verissimo, P.: Towards secure and dependable software-defined networks, vol. 42, pp. 55\u201360. ACM (2013)","DOI":"10.1145\/2491185.2491199"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Bera, S., Misra, S., Vasilakos, A.V.: Software-defined networking for internet of things: a survey (2017)","DOI":"10.1109\/JIOT.2017.2746186"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2018.06.014","volume":"143","author":"J Li","year":"2018","unstructured":"Li, J., Li, D., Yu, Y., Huang, Y., Zhu, J., Geng, J.: Towards full virtualization of SDN infrastructure. Comput. Netw. 143, 1\u201314 (2018). https:\/\/doi.org\/10.1016\/j.comnet.2018.06.014","journal-title":"Comput. Netw."},{"key":"32_CR21","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2016.04.011","volume":"68","author":"W Li","year":"2016","unstructured":"Li, W., Meng, W., Kwok, L.F.: A survey on OpenFlow-based software defined networks: security challenges and countermeasures. J. Netw. Comput. Appl. 68, 126\u2013139 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.04.011","journal-title":"J. Netw. Comput. Appl."},{"key":"32_CR22","doi-asserted-by":"publisher","unstructured":"Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges. IEEE Commun. Surv. Tutor. 1 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2866942","DOI":"10.1109\/COMST.2018.2866942"},{"key":"32_CR23","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2017.1601158","volume":"55","author":"A Akhunzada","year":"2017","unstructured":"Akhunzada, A., Khan, M.K.: Toward secure software defined vehicular networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 55, 110\u2013118 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1601158","journal-title":"IEEE Commun. Mag."},{"key":"32_CR24","unstructured":"Open Networking Foundation: Software-Defined Networking\u202f: The New Norm for Networks. ONF White Paper, vol. 2, pp. 2\u20136 (2012)"},{"key":"32_CR25","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/J.COMNET.2015.02.014","volume":"81","author":"H Farhady","year":"2015","unstructured":"Farhady, H., Lee, H., Nakao, A.: Software-defined networking: a survey. Comput. Netw. 81, 79\u201395 (2015). https:\/\/doi.org\/10.1016\/J.COMNET.2015.02.014","journal-title":"Comput. Netw."},{"key":"32_CR26","unstructured":"G\u00f6ransson, P., Black, C., Culve, T.: Software Defined Networks A Comprehensive Approach. Morgan Kaufmann (2017)"},{"key":"32_CR27","first-page":"6519","volume":"2","author":"G Garg","year":"2014","unstructured":"Garg, G., Garg, R.: Review on architecture & security issues of. Int. J. Innov. Res. Comput. Commun. Eng. 2, 6519\u20136524 (2014)","journal-title":"Int. J. Innov. Res. Comput. Commun. Eng."},{"key":"32_CR28","doi-asserted-by":"publisher","unstructured":"Fan, X., Lu, Z., Ju, L., Mu, D.: The research on security SDN south interface based on OTR protocol. In: 2016 16th International Symposium on Communications and Information Technologies, ISC 2016, pp. 629\u2013633 (2016). https:\/\/doi.org\/10.1109\/ISCIT.2016.7751709","DOI":"10.1109\/ISCIT.2016.7751709"},{"key":"32_CR29","first-page":"113","volume":"7","author":"J Spooner","year":"2016","unstructured":"Spooner, J.: A review of solutions for SDN-exclusive security issues. Int. J. Adv. Comput. Sci. Appl. 7, 113\u2013122 (2016)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"32_CR30","unstructured":"Sharif, W.: A practical framework for finding software vulnerabilities in SDN controllers (2017)"},{"key":"32_CR31","doi-asserted-by":"publisher","unstructured":"Raghav, P., Dua, A.: Enhancing flow security in Ryu controller through set operations. 2017 3rd IEEE International Conference on Computer and Communications, ICCC 2017, vol. 2018-Janua, pp. 1265\u20131269 (2018). https:\/\/doi.org\/10.1109\/CompComm.2017.8322746","DOI":"10.1109\/CompComm.2017.8322746"},{"key":"32_CR32","doi-asserted-by":"crossref","unstructured":"Spooner, J.: A review of solutions for SDN-exclusive security issues, vol. 7, pp. 113\u2013122 (2016)","DOI":"10.14569\/IJACSA.2016.070817"},{"key":"32_CR33","first-page":"5","volume":"13","author":"OM Othman","year":"2013","unstructured":"Othman, O.M., Okamura, K.: Securing distributed control of software defined networks. Int. J. Comput. Sci. Netw. 13, 5\u201314 (2013)","journal-title":"Int. J. Comput. Sci. Netw."},{"key":"32_CR34","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TCC.2014.2355227","volume":"2","author":"H Li","year":"2014","unstructured":"Li, H., Li, P., Guo, S., Nayak, A.: Byzantine-resilient secure software-defined networks with multiple controllers in cloud. IEEE Trans. Cloud Comput. 2, 436\u2013447 (2014). https:\/\/doi.org\/10.1109\/TCC.2014.2355227","journal-title":"IEEE Trans. Cloud Comput."},{"key":"32_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-41717-7_7","volume-title":"Security Protocols XXI","author":"D Yu","year":"2013","unstructured":"Yu, D.: Authentication for resilience: the case of SDN (transcript of discussion). In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS (LNAI and LNB), vol. 8263, pp. 45\u201353. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41717-7_7"},{"key":"32_CR36","doi-asserted-by":"publisher","unstructured":"Wen, X., Chen, Y., Hu, C., Shi, C., Wang, Y.: Towards a secure controller platform for openflow applications, p. 171 (2013). https:\/\/doi.org\/10.1145\/2491185.2491212","DOI":"10.1145\/2491185.2491212"},{"key":"32_CR37","doi-asserted-by":"publisher","unstructured":"Scott-Hayward, S., Kane, C., Sezer, S.: OperationCheckpoint: SDN application control. In: Proceedings - International Conference on Network Protocols, ICNP, pp. 618\u2013623 (2014). https:\/\/doi.org\/10.1109\/ICNP.2014.98","DOI":"10.1109\/ICNP.2014.98"},{"key":"32_CR38","doi-asserted-by":"publisher","unstructured":"Porras, P., Cheung, S., Fong, M., Skinner, K., Yegneswaran, V.: Securing the software defined network control layer. In: Proceedings of 2015 Network and Distributed System Security Symposium, pp. 8\u201311 (2015). https:\/\/doi.org\/10.14722\/ndss.2015.23222","DOI":"10.14722\/ndss.2015.23222"},{"key":"32_CR39","unstructured":"Pemasaran, D., Niaga, D.A.N.: AuthFlow: authentication and access control mechanism for software defined networking diogo (2014)"},{"key":"32_CR40","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. ACM. (2013). http:\/\/dx.doi.org\/10.1145\/2508859.2516684","DOI":"10.1145\/2508859.2516684"},{"key":"32_CR41","doi-asserted-by":"publisher","unstructured":"Fonseca, P., Bennesby, R., Mota, E., Passito, A.: A replication component for resilient OpenFlow-based networking. In: Proceedings of 2012 IEEE Network Operations and Management Symposium, NOMS 2012, pp. 933\u2013939 (2012). https:\/\/doi.org\/10.1109\/NOMS.2012.6212011","DOI":"10.1109\/NOMS.2012.6212011"},{"key":"32_CR42","doi-asserted-by":"publisher","unstructured":"Yao, G., Bi, J., Xiao, P.: Source address validation solution with OpenFlow\/NOX architecture. In: Proceedings - International Conference on Network Protocol, ICNP, pp. 7\u201312 (2011). https:\/\/doi.org\/10.1109\/ICNP.2011.6089085","DOI":"10.1109\/ICNP.2011.6089085"},{"key":"32_CR43","doi-asserted-by":"publisher","unstructured":"Naous, J., Stutsman, R., Mazieres, D., McKeown, N., Zeldovich, N.: Delegating network security with more information, p. 19 (2009). https:\/\/doi.org\/10.1145\/1592681.1592685","DOI":"10.1145\/1592681.1592685"},{"key":"32_CR44","doi-asserted-by":"publisher","unstructured":"Wei, L., Fung, C.: FlowRanger: a request prioritizing algorithm for controller DoS attacks in software defined networks. In: IEEE International Conference on Communication, vol. 2015-Septe, pp. 5254\u20135259 (2015). https:\/\/doi.org\/10.1109\/ICC.2015.7249158","DOI":"10.1109\/ICC.2015.7249158"},{"key":"32_CR45","doi-asserted-by":"publisher","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computer Networking and Communications, ICNC 2015, pp. 77\u201381 (2015). https:\/\/doi.org\/10.1109\/ICCNC.2015.7069319","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"32_CR46","doi-asserted-by":"publisher","unstructured":"Wang, M., Liu, J., Chen, J., Mao, J.: PERM-GUARD\u202f: authenticating the validity of flow rules in software defined networking (2015). https:\/\/doi.org\/10.1109\/CSCloud.2015.89","DOI":"10.1109\/CSCloud.2015.89"},{"key":"32_CR47","doi-asserted-by":"crossref","unstructured":"Shin, S., et al.: Rosemary: A robust , secure , and high-performance network operating system categories and subject descriptors. In: Proceedings of 2014 ACM SIGSAC Conference on Computer and communications security - CCS 2014, pp. 78\u201389 (2014)","DOI":"10.1145\/2660267.2660353"},{"key":"32_CR48","doi-asserted-by":"publisher","unstructured":"Chandrasekaran, B., Tschaen, B., Benson, T.: Isolating and tolerating SDN application failures with LegoSDN, pp. 1\u201312 (2016). https:\/\/doi.org\/10.1145\/2890955.2890965","DOI":"10.1145\/2890955.2890965"},{"key":"32_CR49","doi-asserted-by":"publisher","unstructured":"Zanna, P., O\u2019Neill, B., Radcliffe, P., Hosseini, S., Ul Hoque, M.S.: Adaptive threat management through the integration of IDS into software defined networks. 2014 International Conference on Network of the Future NOF 2014 \u2013 Working on Smart Cloud Networks Systems, SCNS 2014. (2014). https:\/\/doi.org\/10.1109\/NOF.2014.7119792","DOI":"10.1109\/NOF.2014.7119792"},{"key":"32_CR50","doi-asserted-by":"publisher","unstructured":"Duan, Q., Al-Shaer, E., Jafarian, H.: Efficient random route mutation considering flow and network constraints. In: 2013 IEEE Communications and Network Security, CNS 2013, pp. 260\u2013268 (2013). https:\/\/doi.org\/10.1109\/CNS.2013.6682715","DOI":"10.1109\/CNS.2013.6682715"},{"key":"32_CR51","doi-asserted-by":"publisher","unstructured":"Jiang, F.: Combat-sniff: a comprehensive countermeasure to resist data plane eavesdropping in software-defined networks. Am. J. Netw. Commun. 5, 27 (2016). https:\/\/doi.org\/10.11648\/j.ajnc.20160502.13","DOI":"10.11648\/j.ajnc.20160502.13"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:18:38Z","timestamp":1638451118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}