


default search action
6. AIMS 2012: Luxembourg, Luxembourg
- Ramin Sadre, Jiri Novotný, Pavel Celeda, Martin Waldburger, Burkhard Stiller:

Dependable Networks and Services - 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings. Lecture Notes in Computer Science 7279, Springer 2012, ISBN 978-3-642-30632-7
Keynote
- Corrado Leita:

Challenges in Critical Infrastructure Security. 1
Autonomic and Distributed Network Management
- Niels Bouten, Anna Hristoskova

, Femke Ongenae
, Jelle Nelis, Filip De Turck
:
Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm. 2-13 - Andrei Vancea, Guilherme Sperb Machado, Laurent d'Orazio, Burkhard Stiller:

Cooperative Database Caching within Cloud Environments. 14-25 - Stylianos Georgoulas, Klaus Moessner

, Alexis Mansour, Menelaos Pissarides, Panagiotis Spapis
:
A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission Control. 26-37
PhD Workshop - High-Speed Networks and Network Management
- Julius Rückert, David Hausheer

:
Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions. 38-41 - Teemu Rautio, Jukka Mäkelä:

A Multiaccess Enabled Load Balancing in Cognitive Networks. 42-45 - Viktor Pus:

Hardware Acceleration for Measurements in 100 Gb/s Networks. 46-49
Special Environments and Internet of Things
- Kevin Dominik Korte, Anuj Sehgal

, Jürgen Schönwälder
:
A Study of the RPL Repair Process Using ContikiRPL. 50-61 - Radek Krejcí, Pavel Celeda

, Jakub Dobrovolný:
Traffic Measurement and Analysis of Building Automation and Control Networks. 62-73
Network Security
- Tobias Jung, Sylvain Martin, Damien Ernst, Guy Leduc:

SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention. 74-85 - Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto

, Ramin Sadre, Aiko Pras:
SSHCure: A Flow-Based SSH Intrusion Detection System. 86-97 - Thorsten Ries, Radu State, Thomas Engel:

Instant Degradation of Anonymity in Low-Latency Anonymisation Systems. 98-108
PhD Workshop - Intrusion Detection
- Rick Hofstede, Aiko Pras:

Real-Time and Resilient Intrusion Detection: A Flow-Based Approach. 109-112 - Karel Bartos, Martin Rehák:

Distributed Self-organized Collaboration of Autonomous IDS Sensors. 113-117 - Václav Bartos

, Martin Zádník:
Network Anomaly Detection: Comparison and Real-Time Issues. 118-121 - Cynthia Wagner, Thomas Engel:

Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function. 122-125
Keynote
- Jirí Tobola:

How to Build an IT Spin-Off Company. 126
Network Load and Failure Monitoring
- Ricardo de Oliveira Schmidt, Anna Sperotto

, Ramin Sadre, Aiko Pras:
Towards Bandwidth Estimation Using Flow-Level Measurements. 127-138 - Vaibhav Bajpai

, Nikolay Melnikov, Anuj Sehgal
, Jürgen Schönwälder
:
Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms. 139-150
PhD Workshop - Network Monitoring and Security
- Samuel Marchal

, Thomas Engel:
Large Scale DNS Analysis. 151-154 - Petr Velan

, Radek Krejcí:
Flow Information Storage Assessment Using IPFIXcol. 155-158

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














