D. Kourill, T. Rebok, T. Jirsik, J. ?egan, M. Drasar et al., Cloud-based testbed for simulation of cyber attacks, 2014 IEEE Network Operations and Management Symposium (NOMS), 2016.
DOI : 10.1109/NOMS.2014.6838298

J. Ykopal and M. Bartak, On the Design of Security Games: From Frustrating to Engaging Learning, USENIX Workshop on Advances in Security Education. ASE 2016, 2016.

. Solidity, http://solidity.readthedocs.io, 2017.

P. Bosshart, D. Daly, G. Gibb, M. Izzard, N. Mckeown et al., P4, P4: Programming Protocol-independent Packet Processors, pp.87-95
DOI : 10.1145/2656877.2656890

N. Herold, M. Wachs, M. Dorfhuber, C. R. Cloud, and .. , Stefan Liebald, and Georg Carle Management of Cloud Environments and Services Towards a Software-Defined Security Framework for Supporting Distributed, p.47

M. Compastié, R. Badonnel, O. Festor, and .. , Ruan He, and Mohamed Kassi-Lahlou Optimal Service Function Chain Composition in Network Functions Virtualization, p.62

F. Andrés, J. Ocampo, P. H. Gil-herrera, M. C. Isolani, J. F. Neves et al., Gaspary Evaluation and Experimental Study of Rich Network Services An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services, p.79

M. Barshan, H. Moens, and .. , Bruno Volckaert, and Filip De Turck The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications, p.94

L. Kristiana and C. Schmitt, and Burkhard Stiller Towards Internet Scale Quality-of-Experience Measurement with Twitter, p.108

D. Kergl, R. Roedler, G. Dreo-rodosek-short-papers, and .. , Security, Intrusion Detection, and Configuration Hunting SIP Authentication Attacks Efficiently, p.125

L. Hendriks, P. Velan, R. , O. Schmidt, and .. , Pieter-Tjerk de Boer, and Aiko Pras Towards a Hybrid Cloud Platform Using Apache Mesos, p.143

. D. Ph and . Track, Autonomic and Self-Management Solutions

. Smartdemap, A Smart Contract Deployment and Management Platform, p.159

M. Knecht and B. , 165 Merlijn Sebrechts, Gregory Van Seghbroeck, and Filip De Turck Ph.D. Track: Methods for the Protection of Infrastructure and Services Situational Awareness: Detecting Critical Dependencies and Devices in a Network, p.173