A. Björn-richerzhagen, N. Wagener, and . Richerzhagen, Rhaban Hark, and Ralf Steinmetz Cloud Flat Rates Enabled via Fair Multi-resource Consumption, p.30

P. Poullie and B. , Stiller PhD Student Workshop ? Management of Future Networks Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks, p.47

G. Tangari and M. Charalambides, Daphné Tuncer, and George Pavlou S3N -Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power Substations, p.52

T. Bocek, C. Killer-applications, and .. , Christos Tsiaras, and Burkhard Stiller Analysis and Evaluation of OpenFlow Message Usage for Security, p.84

S. Seeber, G. Dreo-rodosek, and .. , Gaëtan Hurel, and Rémi Badonnel On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table, p.98

N. T. Hoang-long-mai, G. Nguyen, and .. Doyen, Alain Ploix, and Remi Cogranne In Whom Do We Trust -Sharing Security Events, p.111

J. Steinberger and B. Kuhnert, Harald Baier, and Aiko Pras PhD Student Workshop ? Security Management Network Defence Using Attacker-Defender Interaction Modelling, p.127

M. ?ermák and P. , ?eleda How to Achieve Early Botnet Detection at the Provider Level?, p.142

B. Wouter, R. De-vries, O. Schmidt, A. Papers, 5. Networks et al., Methods for Management and Security Context-Aware Location Management of Groups of Devices in 155 Konstantinos Chatzikokolakis, Ömer Bulakci, and Nancy Alonistioti Scalability and Information Exchange Among Autonomous Resource Management Agents 160 Siri Fagernes and Alva L. Couch Analysis of Vertical Scans Discovered by Naive Detection. . . . . . . . . . . . . . 165 Tomas Cejka and Marek Svepes