Full Text Documents

Search


Table of Contents
Monitoring and Securing Virtualized Networks and Services
Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides,  Burkhard Stiller (Eds.)
Front Matter

Best Award Paper


A Study of RPL DODAG Version Attacks
Anthéa Mayzaud, Anuj Sehgal, Rémi Badonnel, Isabelle Chrisment, Jürgen Schönwälder
92-104

Emerging Infrastructures for Networks and Services


Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and Services
Radhika Garg, Burkhard Stiller
1-14
ESPRESSO: An Encryption as a Service for Cloud Storage Systems
Seungmin Kang, Bharadwaj Veeravalli, Khin Aung
15-28
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks
Juliette Dromard, Rida Khatoun, Lyes Khoukhi
29-41

Ph.D. Student Workshop — Management of Virtualized Network Resources and Functions


Efficient Management of Virtualized Information-Centric Networks
Maxim Claeys, Steven Latré, Filip Turck
42-46
Contributions to Efficient Resource Management in Virtual Networks
Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat
47-51
Management and Orchestration of Virtualized Network Functions
Elisa Maini, Antonio Manzalini
52-56

Ph.D. Student Workshop — Security Management


Towards Incentivizing ISPs to Mitigate Botnets
Qasim Lone, Giovane Moura, Michel Eeten
57-62
Enhancing Network Security: Host Trustworthiness Estimation
Tomáš Jirsík, Pavel Čeleda
63-68
Characterizing and Mitigating the DDoS-as-a-Service Phenomenon
José Santanna, Anna Sperotto
74-78

Experimental Studies for Security Management


Characterisation of the Kelihos.B Botnet
Max Kerkers, José Santanna, Anna Sperotto
79-91
Toward a Source Detection of Botclouds: A PCA-Based Approach
Hammi Badis, Guillaume Doyen, Rida Khatoun
105-117

Ph.D. Student Workshop — SDN and Content Delivery


Software Defined Networking to Improve Mobility Management Performance
Morteza Karimzadeh, Anna Sperotto, Aiko Pras
118-122
Future of DDoS Attacks Mitigation in Software Defined Networks
Martin Vizváry, Jan Vykopal
123-127
Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery
Leonhard Nobach, David Hausheer
128-132

Monitoring Methods for Quality-of-Service and Security


Goal-Oriented Monitoring Adaptation: Methodology and Patterns
Antoine Toueir, Julien Broisin, Michelle Sibilla
133-146
Detection of Network Flow Timestamp Reliability
Martin Žádnik, Erik Šabik, Václav Bartoš
147-159
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches
Martin Drašar, Tomáš Jirsík, Martin Vizváry
160-172

Ph.D. Student Workshop — Monitoring and Information Sharing


Next Generation Application-Aware Flow Monitoring
Petr Velan, Pavel Čeleda
173-178
A Modular Architecture for Deploying Self-adaptive Traffic Sampling
João Silva, Paulo Carvalho, Solange Lima
179-183
Cross-Layer Optimization with Real-Time Adaptive Dynamic Spectrum Management for Fourth Generation Broadband Access Networks
Jeremy Eynde, Chris Blondia
184-188

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/