Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /
This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with...
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
Series: | Lecture Notes in Computer Science,
10356 |
Subjects: | |
Online Access: | http://dx.doi.org/10.1007/978-3-319-60774-0 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a22000005i 4500 | ||
---|---|---|---|
001 | 978-3-319-60774-0 | ||
003 | DE-He213 | ||
005 | 20180131132537.0 | ||
007 | cr nn 008mamaa | ||
008 | 170616s2017 gw | s |||| 0|eng d | ||
020 | |a 9783319607740 |9 978-3-319-60774-0 | ||
024 | 7 | |a 10.1007/978-3-319-60774-0 |2 doi | |
050 | 4 | |a TK5105.5-5105.9 | |
072 | 7 | |a UKN |2 bicssc | |
072 | 7 | |a COM075000 |2 bisacsh | |
082 | 0 | 4 | |a 004.6 |2 23 |
245 | 1 | 0 | |a Security of Networks and Services in an All-Connected World |h [electronic resource] : |b 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / |c edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. |
264 | 1 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2017. | |
300 | |a XX, 192 p. 55 illus. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 10356 | |
505 | 0 | |a Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains. | |
506 | 0 | |a Open Access | |
520 | |a This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure. | ||
650 | 0 | |a Computer science. | |
650 | 0 | |a Computer communication systems. | |
650 | 0 | |a Computer system failures. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data structures (Computer science). | |
650 | 0 | |a Computers and civilization. | |
650 | 1 | 4 | |a Computer Science. |
650 | 2 | 4 | |a Computer Communication Networks. |
650 | 2 | 4 | |a Systems and Data Security. |
650 | 2 | 4 | |a Data Structures, Cryptology and Information Theory. |
650 | 2 | 4 | |a System Performance and Evaluation. |
650 | 2 | 4 | |a Computers and Society. |
650 | 2 | 4 | |a Information Systems Applications (incl. Internet). |
700 | 1 | |a Tuncer, Daphne. |e editor. | |
700 | 1 | |a Koch, Robert. |e editor. | |
700 | 1 | |a Badonnel, Rémi. |e editor. | |
700 | 1 | |a Stiller, Burkhard. |e editor. | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer eBooks | |
776 | 0 | 8 | |i Printed edition: |z 9783319607733 |
830 | 0 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 10356 | |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-319-60774-0 |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
950 | |a Computer Science (Springer-11645) | ||
999 | |c 189059 |d 189059 |