default search action
8. AIMS 2014: Brno, Czech Republic
- Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller:
Monitoring and Securing Virtualized Networks and Services - 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 - July 3, 2014. Proceedings. Lecture Notes in Computer Science 8508, Springer 2014, ISBN 978-3-662-43861-9 - Radhika Garg, Burkhard Stiller:
Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and Services. 1-14 - Seungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung:
ESPRESSO: An Encryption as a Service for Cloud Storage Systems. 15-28 - Juliette Dromard, Rida Khatoun, Lyes Khoukhi:
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks. 29-41
Ph.D. Student Workshop - Management of Virtualized Network Resources and Functions
- Maxim Claeys, Steven Latré, Filip De Turck:
Efficient Management of Virtualized Information-Centric Networks. 42-46 - Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat:
Contributions to Efficient Resource Management in Virtual Networks. 47-51 - Elisa Maini, Antonio Manzalini:
Management and Orchestration of Virtualized Network Functions. 52-56
Ph.D. Student Workshop - Security Management
- Qasim Lone, Giovane C. M. Moura, Michel van Eeten:
Towards Incentivizing ISPs to Mitigate Botnets. 57-62 - Tomás Jirsík, Pavel Celeda:
Enhancing Network Security: Host Trustworthiness Estimation. 63-68 - Gaëtan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor:
Outsourcing Mobile Security in the Cloud. 69-73 - José Jair Santanna, Anna Sperotto:
Characterizing and Mitigating the DDoS-as-a-Service Phenomenon. 74-78
Experimental Studies for Security Management
- Max Kerkers, José Jair Santanna, Anna Sperotto:
Characterisation of the Kelihos.B Botnet. 79-91 - Anthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder:
A Study of RPL DODAG Version Attacks. 92-104 - Badis Hammi, Guillaume Doyen, Rida Khatoun:
Toward a Source Detection of Botclouds: A PCA-Based Approach. 105-117
Ph.D. Student Workshop - SDN and Content Delivery
- Morteza Karimzadeh, Anna Sperotto, Aiko Pras:
Software Defined Networking to Improve Mobility Management Performance. 118-122 - Martin Vizváry, Jan Vykopal:
Future of DDoS Attacks Mitigation in Software Defined Networks. 123-127 - Leonhard Nobach, David Hausheer:
Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery. 128-132
Monitoring Methods for Quality-of-Service and Security
- Antoine Toueir, Julien Broisin, Michelle Sibilla:
Goal-Oriented Monitoring Adaptation: Methodology and Patterns. 133-146 - Martin Zádník, Erik Sabik, Václav Bartos:
Detection of Network Flow Timestamp Reliability. 147-159 - Martin Drasar, Tomás Jirsík, Martin Vizváry:
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. 160-172
Ph.D. Student Workshop - Monitoring and Information Sharing
- Petr Velan, Pavel Celeda:
Next Generation Application-Aware Flow Monitoring. 173-178 - João Marco C. Silva, Paulo Carvalho, Solange Rito Lima:
A Modular Architecture for Deploying Self-adaptive Traffic Sampling. 179-183 - Jeremy Van den Eynde, Chris Blondia:
Cross-Layer Optimization with Real-Time Adaptive Dynamic Spectrum Management for Fourth Generation Broadband Access Networks. 184-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.