E-Book, Englisch, 171 Seiten, eBook
Reihe: Computer Communication Networks and Telecommunications
Badonnel / Koch / Pras Management and Security in the Age of Hyperconnectivity
1. Auflage 2016
ISBN: 978-3-319-39814-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings
E-Book, Englisch, 171 Seiten, eBook
Reihe: Computer Communication Networks and Telecommunications
ISBN: 978-3-319-39814-3
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Network Element Stability Aware Method for Verifying Configuration Changesin Mobile Communication Networks.- A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds.- Cloud Flat Rates Enabled via Fair Multi-resource Consumption.- Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks.- S3N - Smart Solution for Substation Networks, an Architecture for theManagement of Communication Networks in Power Substations.- Towards a QoS-oriented Migration Management Approach for Virtualized Network.- Functional Decomposition in 5G Networks.- An NFC Relay Attack with Off-the-Shelf Hardware and Software.- Analysis and Evaluation of OpenFlow Message Usage for Security Applications.- On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table.- In Whom Do We Trust - Sharing Security Events.- Network Defence Using Attacker-Defender InteractionModelling.- Evaluating Reputation of Internet Entities.- Detecting Advanced Network Threats Using Similarity Search.- How to Achieve Early Botnet Detection at the Provider Level?.- Anycast and Its Potential for DDoS Mitigation.- Context-Aware Location Management of Groups of Devices in 5G Networks.- Scalability and Information Exchange among Autonomous Resource Management Agents.- Analysis of Vertical Scans Discovered by Naive Detection.