TY - BOOK AU - Sadre,Ramin ED - International Conference on Autonomous Infrastructure, Management and Security TI - Dependable networks and services: 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012 : proceedings T2 - Lecture notes in computer science, SN - 9783642306334 AV - TK5105.5 .I58 2012 U1 - 004.6068 23 PY - 2012/// CY - Heidelberg, New York PB - Springer KW - Computer networks KW - Management KW - Congresses KW - Scalability KW - Computer security KW - Réseaux d'ordinateurs KW - Gestion KW - Congrès KW - Extensibilité KW - Sécurité informatique KW - Informatique KW - eclas KW - fast KW - Computer science KW - Software engineering KW - Operating systems (Computers) KW - Computer software KW - Information Systems Applications (incl. Internet) KW - Algorithm Analysis and Problem Complexity KW - Operating Systems KW - Programming Techniques KW - Conference papers and proceedings KW - Software KW - lcgft N1 - Includes bibliographical references and index; Challenges in Critical Infrastructure Security; Corrado Leita --; Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm; Niels Bouten, Anna Hristoskova, Femke Ongenae, Jelle Nelis and Filip De Turck --; Cooperative Database Caching within Cloud Environments; Andrei Vancea, Guilherme Sperb Machado, Laurent d'Orazio and Burkhard Stiller --; A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission Control; Stylianos Georgoulas, Klaus Moessner, Alexis Mansour, Menelaos Pissarides and Panagiotis Spapis --; Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions; Julius Rückert and David Hausheer --; A Multiaccess Enabled Load Balancing in Cognitive Networks; Teemu Rautio and Jukka Mäkelä --; Hardware Acceleration for Measurements in 100 Gb/s Networks; Viktor Puš --; A Study of the RPL Repair Process Using ContikiRPL; Kevin Dominik Korte, Anuj Sehgal and Jürgen Schönwälder --; Traffic Measurement and Analysis of Building Automation and Control Networks; Radek Krejčí, Pavel Čeleda and Jakub Dobrovolný; SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention; Tobias Jung, Sylvain Martin, Damien Ernst and Guy Leduc --; SSHCure: A Flow-Based SSH Intrusion Detection System; Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto and Ramin Sadre, et al. --; Instant Degradation of Anonymity in Low-Latency Anonymisation Systems; Thorsten Ries, Radu State and Thomas Engel --; Real-Time and Resilient Intrusion Detection: A Flow-Based Approach; Rick Hofstede and Aiko Pras --; Distributed Self-organized Collaboration of Autonomous IDS Sensors; Karel Bartos and Martin Rehak --; Network Anomaly Detection: Comparison and Real-Time Issues; Václav Bartoš and Martin Žádník --; Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function; Cynthia Wagner and Thomas Engel --; How to Build an IT Spin-Off Company; Jiří Tobola --; Towards Bandwidth Estimation Using Flow-Level Measurements; Ricardo de O. Schmidt, Anna Sperotto, Ramin Sadre and Aiko Pras --; Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms; Vaibhav Bajpai, Nikolay Melnikov, Anuj Sehgal and Jürgen Schönwälder --; Large Scale DNS Analysis; Samuel Marchal and Thomas Engel --; Flow Information Storage Assessment Using IPFIXcol; Petr Velan and Radek Krejčí N2 - Annotation; This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security UR - https://link.springer.com/10.1007/978-3-642-30633-4 ER -