index - Management and Security in the Age of Hyperconnectivity
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Management and Security in the Age of Hyperconnectivity
Rémi Badonnel, Robert Koch, Aiko Pras, Martin Drašar, Burkhard Stiller
Front Matter

Autonomic and Smart Management


Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication Networks
Janne Ali-Tolppa, Tsvetko Tsvetkov
3-15
A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds
Björn Richerzhagen, Alexander Wagener, Nils Richerzhagen, Rhaban Hark, Ralf Steinmetz
16-29
Cloud Flat Rates Enabled via Fair Multi-resource Consumption
Patrick Poullie, Burkhard Stiller
30-44

PhD Student Workshop — Management of Future Networks


Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks
Gioacchino Tangari, Marinos Charalambides, Daphné Tuncer, George Pavlou
47-51
S3N - Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power Substations
Erwin Leal, Juan Botero
52-56
Towards a QoS-Oriented Migration Management Approach for Virtualized Networks
Mahboobeh Zangiabady, Javier Rubio-Loyola
57-61
Functional Decomposition in 5G Networks
Davit Harutyunyan, Roberto Riggio
62-67

Security Attacks and Defenses


An NFC Relay Attack with Off-the-shelf Hardware and Software
Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller
71-83
Analysis and Evaluation of OpenFlow Message Usage for Security Applications
Sebastian Seeber, Gabi Rodosek, Gaëtan Hurel, Rémi Badonnel
84-97
On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table
Hoang Mai, Ngoc Nguyen, Guillaume Doyen, Alain Ploix, Remi Cogranne
98-110
In Whom Do We Trust - Sharing Security Events
Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras
111-124

PhD Student Workshop — Security Management


Network Defence Using Attacker-Defender Interaction Modelling
Jana Medková, Pavel Čeleda
127-131
Evaluating Reputation of Internet Entities
Václav Bartoš, Jan Kořenek
132-136
Detecting Advanced Network Threats Using a Similarity Search
Milan Čermák, Pavel Čeleda
137-141
How to Achieve Early Botnet Detection at the Provider Level?
Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras
142-146
Anycast and Its Potential for DDoS Mitigation
Wouter Vries, Ricardo Schmidt, Aiko Pras
147-151

Short Papers — Methods for Management and Security


Context-Aware Location Management of Groups of Devices in 5G Networks
Konstantinos Chatzikokolakis, Alexandros Kaloxylos, Panagiotis Spapis, Chan Zhou, Ömer Bulakci, Nancy Alonistioti
155-159
Scalability and Information Exchange Among Autonomous Resource Management Agents
Siri Fagernes, Alva Couch
160-164
Analysis of Vertical Scans Discovered by Naive Detection
Tomas Cejka, Marek Svepes
165-169

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/