Table of Contents
|
Dependable Networks and Services Ramin Sadre, Jiří Novotný, Pavel Čeleda, Martin Waldburger, Burkhard Stiller (Eds.)
|
Front Matter |
Keynote
|
Challenges in Critical Infrastructure Security Corrado Leita |
1-1 |
Autonomic and Distributed Network Management
|
Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm Niels Bouten, Anna Hristoskova, Femke Ongenae, Jelle Nelis, Filip Turck |
2-13 |
Cooperative Database Caching within Cloud Environments Andrei Vancea, Guilherme Machado, Laurent D’orazio, Burkhard Stiller |
14-25 |
A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission Control Stylianos Georgoulas, Klaus Moessner, Alexis Mansour, Menelaos Pissarides, Panagiotis Spapis |
26-37 |
PhD Workshop—High-Speed Networks and Network Management
|
Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions Julius Rückert, David Hausheer |
38-41 |
A Multiaccess Enabled Load Balancing in Cognitive Networks Teemu Rautio, Jukka Mäkelä |
42-45 |
Hardware Acceleration for Measurements in 100 Gb/s Networks Viktor Puš |
46-49 |
Special Environments and Internet of Things
|
A Study of the RPL Repair Process Using ContikiRPL Kevin Korte, Anuj Sehgal, Jürgen Schönwälder |
50-61 |
Traffic Measurement and Analysis of Building Automation and Control Networks Radek Krejčí, Pavel Čeleda, Jakub Dobrovolný |
62-73 |
Network Security
|
SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention Tobias Jung, Sylvain Martin, Damien Ernst, Guy Leduc |
74-85 |
SSHCure: A Flow-Based SSH Intrusion Detection System Laurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto, Ramin Sadre, Aiko Pras |
86-97 |
Instant Degradation of Anonymity in Low-Latency Anonymisation Systems Thorsten Ries, Radu State, Thomas Engel |
98-108 |
PhD Workshop—Intrusion Detection
|
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach Rick Hofstede, Aiko Pras |
109-112 |
Distributed Self-organized Collaboration of Autonomous IDS Sensors Karel Bartos, Martin Rehak |
113-117 |
Network Anomaly Detection: Comparison and Real-Time Issues Václav Bartoš, Martin Žádník |
118-121 |
Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function Cynthia Wagner, Thomas Engel |
122-125 |
Keynote
|
How to Build an IT Spin-Off Company Jiří Tobola |
126-126 |
Network Load and Failure Monitoring
|
Towards Bandwidth Estimation Using Flow-Level Measurements Ricardo O. Schmidt, Anna Sperotto, Ramin Sadre, Aiko Pras |
127-138 |
Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms Vaibhav Bajpai, Nikolay Melnikov, Anuj Sehgal, Jürgen Schönwälder |
139-150 |
PhD Workshop—Network Monitoring and Security
|
Large Scale DNS Analysis Samuel Marchal, Thomas Engel |
151-154 |
Flow Information Storage Assessment Using IPFIXcol Petr Velan, Radek Krejčí |
155-158 |