Dependable Networks and Services

6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012. Proceedings

ISBN: 978-3-642-30632-7 (Print) 978-3-642-30633-4 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Keynote

    1. No Access

      Book Chapter

      Pages 1-1

      Challenges in Critical Infrastructure Security

  3. Autonomic and Distributed Network Management

    1. No Access

      Book Chapter

      Pages 2-13

      Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm

    2. No Access

      Book Chapter

      Pages 14-25

      Cooperative Database Caching within Cloud Environments

    3. No Access

      Book Chapter

      Pages 26-37

      A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission Control

  4. PhD Workshop—High-Speed Networks and Network Management

    1. No Access

      Book Chapter

      Pages 38-41

      Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions

    2. No Access

      Book Chapter

      Pages 42-45

      A Multiaccess Enabled Load Balancing in Cognitive Networks

    3. No Access

      Book Chapter

      Pages 46-49

      Hardware Acceleration for Measurements in 100 Gb/s Networks

  5. Special Environments and Internet of Things

    1. No Access

      Book Chapter

      Pages 50-61

      A Study of the RPL Repair Process Using ContikiRPL

    2. No Access

      Book Chapter

      Pages 62-73

      Traffic Measurement and Analysis of Building Automation and Control Networks

  6. Network Security

    1. No Access

      Book Chapter

      Pages 74-85

      SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention

    2. No Access

      Book Chapter

      Pages 86-97

      SSHCure: A Flow-Based SSH Intrusion Detection System

    3. No Access

      Book Chapter

      Pages 98-108

      Instant Degradation of Anonymity in Low-Latency Anonymisation Systems

  7. PhD Workshop—Intrusion Detection

    1. No Access

      Book Chapter

      Pages 109-112

      Real-Time and Resilient Intrusion Detection: A Flow-Based Approach

    2. No Access

      Book Chapter

      Pages 113-117

      Distributed Self-organized Collaboration of Autonomous IDS Sensors

    3. No Access

      Book Chapter

      Pages 118-121

      Network Anomaly Detection: Comparison and Real-Time Issues

    4. No Access

      Book Chapter

      Pages 122-125

      Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function

  8. Keynote

    1. No Access

      Book Chapter

      Pages 126-126

      How to Build an IT Spin-Off Company

  9. Network Load and Failure Monitoring

    1. No Access

      Book Chapter

      Pages 127-138

      Towards Bandwidth Estimation Using Flow-Level Measurements

    2. No Access

      Book Chapter

      Pages 139-150

      Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms

  10. PhD Workshop—Network Monitoring and Security

    1. No Access

      Book Chapter

      Pages 151-154

      Large Scale DNS Analysis

  11. Back Matter

    Pages -

previous Page of 2