default search action
10. AIMS 2016: Munich, Germany
- Rémi Badonnel, Robert Koch, Aiko Pras, Martin Drasar, Burkhard Stiller:
Management and Security in the Age of Hyperconnectivity - 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings. Lecture Notes in Computer Science 9701, Springer 2016, ISBN 978-3-319-39813-6
Autonomic and Smart Management
- Janne Ali-Tolppa, Tsvetko Tsvetkov:
Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication Networks. 3-15 - Björn Richerzhagen, Alexander Wagener, Nils Richerzhagen, Rhaban Hark, Ralf Steinmetz:
A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds. 16-29 - Patrick Poullie, Burkhard Stiller:
Cloud Flat Rates Enabled via Fair Multi-resource Consumption. 30-44
PhD Student Workshop - Management of Future Networks
- Gioacchino Tangari, Marinos Charalambides, Daphné Tuncer, George Pavlou:
Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks. 47-51 - Erwin Alexander Leal, Juan Felipe Botero:
S3N - Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power Substations. 52-56 - Mahboobeh Zangiabady, Javier Rubio-Loyola:
Towards a QoS-Oriented Migration Management Approach for Virtualized Networks. 57-61 - Davit Harutyunyan, Roberto Riggio:
Functional Decomposition in 5G Networks. 62-67
Security Attacks and Defenses
- Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller:
An NFC Relay Attack with Off-the-shelf Hardware and Software. 71-83 - Sebastian Seeber, Gabi Dreo Rodosek, Gaëtan Hurel, Rémi Badonnel:
Analysis and Evaluation of OpenFlow Message Usage for Security Applications. 84-97 - Hoang Long Mai, Ngoc Tan Nguyen, Guillaume Doyen, Alain Ploix, Rémi Cogranne:
On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table. 98-110 - Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras:
In Whom Do We Trust - Sharing Security Events. 111-124
PhD Student Workshop - Security Management
- Jana Medková, Pavel Celeda:
Network Defence Using Attacker-Defender Interaction Modelling. 127-131 - Václav Bartos, Jan Korenek:
Evaluating Reputation of Internet Entities. 132-136 - Milan Cermák, Pavel Celeda:
Detecting Advanced Network Threats Using a Similarity Search. 137-141 - Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras:
How to Achieve Early Botnet Detection at the Provider Level? 142-146 - Wouter B. de Vries, Ricardo de Oliveira Schmidt, Aiko Pras:
Anycast and Its Potential for DDoS Mitigation. 147-151
Short Papers - Methods for Management and Security
- Konstantinos Chatzikokolakis, Alexandros Kaloxylos, Panagiotis Spapis, Chan Zhou, Ömer Bulakci, Nancy Alonistioti:
Context-Aware Location Management of Groups of Devices in 5G Networks. 155-159 - Siri Fagernes, Alva L. Couch:
Scalability and Information Exchange Among Autonomous Resource Management Agents. 160-164 - Tomás Cejka, Marek Svepes:
Analysis of Vertical Scans Discovered by Naive Detection. 165-169
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.