


default search action
10. AIMS 2016: Munich, Germany
- Rémi Badonnel, Robert Koch, Aiko Pras, Martin Drasar, Burkhard Stiller:

Management and Security in the Age of Hyperconnectivity - 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings. Lecture Notes in Computer Science 9701, Springer 2016, ISBN 978-3-319-39813-6
Autonomic and Smart Management
- Janne Ali-Tolppa, Tsvetko Tsvetkov:

Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication Networks. 3-15 - Björn Richerzhagen, Alexander Wagener, Nils Richerzhagen, Rhaban Hark, Ralf Steinmetz

:
A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds. 16-29 - Patrick Poullie, Burkhard Stiller:

Cloud Flat Rates Enabled via Fair Multi-resource Consumption. 30-44
PhD Student Workshop - Management of Future Networks
- Gioacchino Tangari, Marinos Charalambides

, Daphné Tuncer, George Pavlou:
Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks. 47-51 - Erwin Alexander Leal

, Juan Felipe Botero
:
S3N - Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power Substations. 52-56 - Mahboobeh Zangiabady

, Javier Rubio-Loyola:
Towards a QoS-Oriented Migration Management Approach for Virtualized Networks. 57-61 - Davit Harutyunyan, Roberto Riggio

:
Functional Decomposition in 5G Networks. 62-67
Security Attacks and Defenses
- Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller:

An NFC Relay Attack with Off-the-shelf Hardware and Software. 71-83 - Sebastian Seeber, Gabi Dreo Rodosek, Gaëtan Hurel, Rémi Badonnel:

Analysis and Evaluation of OpenFlow Message Usage for Security Applications. 84-97 - Hoang Long Mai, Ngoc Tan Nguyen, Guillaume Doyen, Alain Ploix, Rémi Cogranne

:
On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table. 98-110 - Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto

, Harald Baier, Aiko Pras:
In Whom Do We Trust - Sharing Security Events. 111-124
PhD Student Workshop - Security Management
- Jana Medková, Pavel Celeda

:
Network Defence Using Attacker-Defender Interaction Modelling. 127-131 - Václav Bartos

, Jan Korenek:
Evaluating Reputation of Internet Entities. 132-136 - Milan Cermák

, Pavel Celeda
:
Detecting Advanced Network Threats Using a Similarity Search. 137-141 - Christian Dietz, Anna Sperotto

, Gabi Dreo, Aiko Pras:
How to Achieve Early Botnet Detection at the Provider Level? 142-146 - Wouter B. de Vries, Ricardo de Oliveira Schmidt, Aiko Pras:

Anycast and Its Potential for DDoS Mitigation. 147-151
Short Papers - Methods for Management and Security
- Konstantinos Chatzikokolakis, Alexandros Kaloxylos

, Panagiotis Spapis
, Chan Zhou, Ömer Bulakci, Nancy Alonistioti:
Context-Aware Location Management of Groups of Devices in 5G Networks. 155-159 - Siri Fagernes, Alva L. Couch:

Scalability and Information Exchange Among Autonomous Resource Management Agents. 160-164 - Tomás Cejka

, Marek Svepes:
Analysis of Vertical Scans Discovered by Naive Detection. 165-169

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














