Skip to Main content Skip to Navigation
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Monitoring and Securing Virtualized Networks and Services
Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides,  Burkhard Stiller (Eds.)
Front Matter

Best Award Paper


A Study of RPL DODAG Version Attacks
Anthéa Mayzaud, Anuj Sehgal, Rémi Badonnel, Isabelle Chrisment, Jürgen Schönwälder
92-104

Emerging Infrastructures for Networks and Services


Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and Services
Radhika Garg, Burkhard Stiller
1-14
ESPRESSO: An Encryption as a Service for Cloud Storage Systems
Seungmin Kang, Bharadwaj Veeravalli, Khin Aung
15-28
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks
Juliette Dromard, Rida Khatoun, Lyes Khoukhi
29-41

Ph.D. Student Workshop — Management of Virtualized Network Resources and Functions


Efficient Management of Virtualized Information-Centric Networks
Maxim Claeys, Steven Latré, Filip Turck
42-46
Contributions to Efficient Resource Management in Virtual Networks
Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat
47-51
Management and Orchestration of Virtualized Network Functions
Elisa Maini, Antonio Manzalini
52-56

Ph.D. Student Workshop — Security Management


Towards Incentivizing ISPs to Mitigate Botnets
Qasim Lone, Giovane Moura, Michel Eeten
57-62
Enhancing Network Security: Host Trustworthiness Estimation
Tomáš Jirsík, Pavel Čeleda
63-68
Characterizing and Mitigating the DDoS-as-a-Service Phenomenon
José Santanna, Anna Sperotto
74-78

Experimental Studies for Security Management


Characterisation of the Kelihos.B Botnet
Max Kerkers, José Santanna, Anna Sperotto
79-91
Toward a Source Detection of Botclouds: A PCA-Based Approach
Hammi Badis, Guillaume Doyen, Rida Khatoun
105-117

Ph.D. Student Workshop — SDN and Content Delivery


Software Defined Networking to Improve Mobility Management Performance
Morteza Karimzadeh, Anna Sperotto, Aiko Pras
118-122
Future of DDoS Attacks Mitigation in Software Defined Networks
Martin Vizváry, Jan Vykopal
123-127
Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery
Leonhard Nobach, David Hausheer
128-132

Monitoring Methods for Quality-of-Service and Security


Goal-Oriented Monitoring Adaptation: Methodology and Patterns
Antoine Toueir, Julien Broisin, Michelle Sibilla
133-146
Detection of Network Flow Timestamp Reliability
Martin Žádnik, Erik Šabik, Václav Bartoš
147-159
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches
Martin Drašar, Tomáš Jirsík, Martin Vizváry
160-172

Ph.D. Student Workshop — Monitoring and Information Sharing


Next Generation Application-Aware Flow Monitoring
Petr Velan, Pavel Čeleda
173-178
A Modular Architecture for Deploying Self-adaptive Traffic Sampling
João Silva, Paulo Carvalho, Solange Lima
179-183
Cross-Layer Optimization with Real-Time Adaptive Dynamic Spectrum Management for Fourth Generation Broadband Access Networks
Jeremy Eynde, Chris Blondia
184-188

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/