Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /
This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with...
Salvato in:
| Ente Autore: | |
|---|---|
| Altri autori: | , , , |
| Natura: | Elettronico eBook |
| Lingua: | inglese |
| Pubblicazione: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
| Serie: | Lecture Notes in Computer Science,
10356 |
| Soggetti: | |
| Accesso online: | http://dx.doi.org/10.1007/978-3-319-60774-0 |
| Tags: |
Nessun Tag, puoi essere il primo ad aggiungerne!!
|
MARC
| LEADER | 00000nam a22000005i 4500 | ||
|---|---|---|---|
| 001 | 978-3-319-60774-0 | ||
| 003 | DE-He213 | ||
| 005 | 20180131132537.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 170616s2017 gw | s |||| 0|eng d | ||
| 020 | |a 9783319607740 |9 978-3-319-60774-0 | ||
| 024 | 7 | |a 10.1007/978-3-319-60774-0 |2 doi | |
| 050 | 4 | |a TK5105.5-5105.9 | |
| 072 | 7 | |a UKN |2 bicssc | |
| 072 | 7 | |a COM075000 |2 bisacsh | |
| 082 | 0 | 4 | |a 004.6 |2 23 |
| 245 | 1 | 0 | |a Security of Networks and Services in an All-Connected World |h [electronic resource] : |b 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings / |c edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. |
| 264 | 1 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2017. | |
| 300 | |a XX, 192 p. 55 illus. |b online resource. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 347 | |a text file |b PDF |2 rda | ||
| 490 | 1 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 10356 | |
| 505 | 0 | |a Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains. | |
| 506 | 0 | |a Open Access | |
| 520 | |a This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure. | ||
| 650 | 0 | |a Computer science. | |
| 650 | 0 | |a Computer communication systems. | |
| 650 | 0 | |a Computer system failures. | |
| 650 | 0 | |a Computer security. | |
| 650 | 0 | |a Data structures (Computer science). | |
| 650 | 0 | |a Computers and civilization. | |
| 650 | 1 | 4 | |a Computer Science. |
| 650 | 2 | 4 | |a Computer Communication Networks. |
| 650 | 2 | 4 | |a Systems and Data Security. |
| 650 | 2 | 4 | |a Data Structures, Cryptology and Information Theory. |
| 650 | 2 | 4 | |a System Performance and Evaluation. |
| 650 | 2 | 4 | |a Computers and Society. |
| 650 | 2 | 4 | |a Information Systems Applications (incl. Internet). |
| 700 | 1 | |a Tuncer, Daphne. |e editor. | |
| 700 | 1 | |a Koch, Robert. |e editor. | |
| 700 | 1 | |a Badonnel, Rémi. |e editor. | |
| 700 | 1 | |a Stiller, Burkhard. |e editor. | |
| 710 | 2 | |a SpringerLink (Online service) | |
| 773 | 0 | |t Springer eBooks | |
| 776 | 0 | 8 | |i Printed edition: |z 9783319607733 |
| 830 | 0 | |a Lecture Notes in Computer Science, |x 0302-9743 ; |v 10356 | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-319-60774-0 |
| 912 | |a ZDB-2-SCS | ||
| 912 | |a ZDB-2-LNC | ||
| 950 | |a Computer Science (Springer-11645) | ||
| 999 | |c 189059 |d 189059 | ||