


default search action
9. AIMS 2015: Ghent, Belgium
- Steven Latré, Marinos Charalambides, Jérôme François

, Corinna Schmitt, Burkhard Stiller:
Intelligent Mechanisms for Network Configuration and Security - 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings. Lecture Notes in Computer Science 9122, Springer 2015, ISBN 978-3-319-20033-0
Autonomic and Decentralized Management
- Obinna Okonor, Ning Wang

, Zhili Sun
, Stylianos Georgoulas:
Disruption-Free Link Wake-Up Optimisation for Energy Aware Networks. 3-16 - Alexander Frömmgen, Björn Richerzhagen, Julius Rückert, David Hausheer

, Ralf Steinmetz
, Alejandro P. Buchmann:
Towards the Description and Execution of Transitions in Networked Systems. 17-29 - Patrick Bosch, Bart Braem, Steven Latré:

A Network-Driven Multi-Access-Point Load-Balancing Algorithm for Large-Scale Public Hotspots. 30-42
Ph.D. Student Workshop - Management of Future Networking
- Luis Alejandro Fletscher, Catalina Valencia Peroni

, Juan Felipe Botero
:
SON Mechanism for Green Heterogeneous Cellular Networks. 45-49 - Stefano Petrangeli, Filip De Turck

:
QoE-Centric Management of Advanced Multimedia Services. 50-55 - Salvatore Signorello, Radu State, Olivier Festor

:
Exploring IoT Protocols Through the Information-Centric Networking's Lens. 56-60 - Bart Spinnewyn, Steven Latré:

Towards a Fluid Cloud: An Extension of the Cloud into the Local Network. 61-65 - Viet-Hoang Tran, Ramin Sadre, Olivier Bonaventure:

Measuring and Modeling Multipath TCP. 66-70
Security, Privacy, and Measurements
- Gustav Sourek

, Ondrej Kuzelka
, Filip Zelezný
:
Learning to Detect Network Intrusion from a Few Labeled Events and Background Traffic. 73-86 - Tomás Cejka

, Václav Bartos
, Lukas Truxa, Hana Kubátová:
Using Application-Aware Flow Monitoring for SIP Fraud Detection. 87-99 - Daniel Dönni, Guilherme Sperb Machado, Christos Tsiaras, Burkhard Stiller:

Schengen Routing: A Compliance Analysis. 100-112 - Wouter Willem de Vries, José Jair Santanna, Anna Sperotto

, Aiko Pras:
How Asymmetric Is the Internet? - A Study to Support the Use of Traceroute. 113-125
Ph.D. Student Workshop - Security Management
- Mattijs Jonker, Anna Sperotto

:
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking. 129-133 - Sebastian Seeber, Gabi Dreo Rodosek:

Towards an Adaptive and Effective IDS Using OpenFlow. 134-139 - Ivo Friedberg

, Kieran McLaughlin, Paul Smith
:
Towards a Cyber-Physical Resilience Framework for Smart Grids. 140-144 - Luuk Hendriks, Anna Sperotto

, Aiko Pras:
Characterizing the IPv6 Security Landscape by Large-Scale Measurements. 145-149

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














