Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings /

This book constitutes the refereed proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, held in Munich, Germany, in June 2016. The 7 full papers presented together with 3 short papers were carefully reviewed and selected from...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Badonnel, Rémi (Επιμελητής έκδοσης), Koch, Robert (Επιμελητής έκδοσης), Pras, Aiko (Επιμελητής έκδοσης), Drašar, Martin (Επιμελητής έκδοσης), Stiller, Burkhard (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2016.
Σειρά:Lecture Notes in Computer Science, 9701
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication Networks
  • A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds
  • Cloud Flat Rates Enabled via Fair Multi-resource Consumption
  • Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks
  • S3N - Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power Substations
  • Towards a QoS-oriented Migration Management Approach for Virtualized Network
  • Functional Decomposition in 5G Networks
  • An NFC Relay Attack with Off-the-Shelf Hardware and Software
  • Analysis and Evaluation of OpenFlow Message Usage for Security Applications
  • On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table
  • In Whom Do We Trust - Sharing Security Events
  • Network Defence Using Attacker-Defender Interaction Modelling
  • Evaluating Reputation of Internet Entities
  • Detecting Advanced Network Threats Using Similarity Search
  • How to Achieve Early Botnet Detection at the Provider Level?
  • Anycast and Its Potential for DDoS Mitigation
  • Context-Aware Location Management of Groups of Devices in 5G Networks
  • Scalability and Information Exchange among Autonomous Resource Management Agents
  • Analysis of Vertical Scans Discovered by Naive Detection.