Cargando…

Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings /

This book constitutes the refereed proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, held in Munich, Germany, in June 2016. The 7 full papers presented together with 3 short papers were carefully reviewed and selected from...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Badonnel, Rémi (Editor ), Koch, Robert (Editor ), Pras, Aiko (Editor ), Drašar, Martin (Editor ), Stiller, Burkhard (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2016.
Edición:1st ed. 2016.
Colección:Computer Communication Networks and Telecommunications, 9701
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication Networks
  • A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds
  • Cloud Flat Rates Enabled via Fair Multi-resource Consumption
  • Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks
  • S3N - Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power Substations
  • Towards a QoS-oriented Migration Management Approach for Virtualized Network
  • Functional Decomposition in 5G Networks
  • An NFC Relay Attack with Off-the-Shelf Hardware and Software
  • Analysis and Evaluation of OpenFlow Message Usage for Security Applications
  • On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table
  • In Whom Do We Trust - Sharing Security Events
  • Network Defence Using Attacker-Defender Interaction Modelling
  • Evaluating Reputation of Internet Entities
  • Detecting Advanced Network Threats Using Similarity Search
  • How to Achieve Early Botnet Detection at the Provider Level?
  • Anycast and Its Potential for DDoS Mitigation
  • Context-Aware Location Management of Groups of Devices in 5G Networks
  • Scalability and Information Exchange among Autonomous Resource Management Agents
  • Analysis of Vertical Scans Discovered by Naive Detection.