Dependable networks and services : 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012 : proceedings / edited by Ramin Sadre [and others].
Material type:
TextSeries: Lecture notes in computer science ; 7279.Publication details: Heidelberg ; New York : Springer, ©2012.Description: 1 online resource (xiii, 160 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783642306334
- 3642306330
- Computer networks -- Management -- Congresses
- Computer networks -- Scalability -- Congresses
- Computer security -- Congresses
- Réseaux d'ordinateurs -- Gestion -- Congrès
- Réseaux d'ordinateurs -- Extensibilité -- Congrès
- Sécurité informatique -- Congrès
- Informatique
- Computer networks -- Management
- Computer networks -- Scalability
- Computer security
- Computer science
- Software engineering
- Operating systems (Computers)
- Computer software
- Information Systems Applications (incl. Internet)
- Algorithm Analysis and Problem Complexity
- Operating Systems
- Programming Techniques
- 004.6068 23
- TK5105.5 .I58 2012
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Challenges in Critical Infrastructure Security / Corrado Leita -- Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm / Niels Bouten, Anna Hristoskova, Femke Ongenae, Jelle Nelis and Filip De Turck -- Cooperative Database Caching within Cloud Environments / Andrei Vancea, Guilherme Sperb Machado, Laurent d'Orazio and Burkhard Stiller -- A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission Control / Stylianos Georgoulas, Klaus Moessner, Alexis Mansour, Menelaos Pissarides and Panagiotis Spapis -- Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions / Julius Rückert and David Hausheer -- A Multiaccess Enabled Load Balancing in Cognitive Networks / Teemu Rautio and Jukka Mäkelä -- Hardware Acceleration for Measurements in 100 Gb/s Networks / Viktor Puš -- A Study of the RPL Repair Process Using ContikiRPL / Kevin Dominik Korte, Anuj Sehgal and Jürgen Schönwälder -- Traffic Measurement and Analysis of Building Automation and Control Networks / Radek Krejčí, Pavel Čeleda and Jakub Dobrovolný.
SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention / Tobias Jung, Sylvain Martin, Damien Ernst and Guy Leduc -- SSHCure: A Flow-Based SSH Intrusion Detection System / Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto and Ramin Sadre, et al. -- Instant Degradation of Anonymity in Low-Latency Anonymisation Systems / Thorsten Ries, Radu State and Thomas Engel -- Real-Time and Resilient Intrusion Detection: A Flow-Based Approach / Rick Hofstede and Aiko Pras -- Distributed Self-organized Collaboration of Autonomous IDS Sensors / Karel Bartos and Martin Rehak -- Network Anomaly Detection: Comparison and Real-Time Issues / Václav Bartoš and Martin Žádník -- Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function / Cynthia Wagner and Thomas Engel -- How to Build an IT Spin-Off Company / Jiří Tobola -- Towards Bandwidth Estimation Using Flow-Level Measurements / Ricardo de O. Schmidt, Anna Sperotto, Ramin Sadre and Aiko Pras -- Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms / Vaibhav Bajpai, Nikolay Melnikov, Anuj Sehgal and Jürgen Schönwälder -- Large Scale DNS Analysis / Samuel Marchal and Thomas Engel -- Flow Information Storage Assessment Using IPFIXcol / Petr Velan and Radek Krejčí.
Includes bibliographical references and index.
Annotation This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security.