Table of Contents
|
Monitoring and Securing Virtualized Networks and Services Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller (Eds.)
|
Front Matter |
Best Award Paper
|
A Study of RPL DODAG Version Attacks Anthéa Mayzaud, Anuj Sehgal, Rémi Badonnel, Isabelle Chrisment, Jürgen Schönwälder
|
92-104 |
Emerging Infrastructures for Networks and Services
|
Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and Services Radhika Garg, Burkhard Stiller |
1-14 |
ESPRESSO: An Encryption as a Service for Cloud Storage Systems Seungmin Kang, Bharadwaj Veeravalli, Khin Aung |
15-28 |
Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh Networks Juliette Dromard, Rida Khatoun, Lyes Khoukhi |
29-41 |
Ph.D. Student Workshop — Management of Virtualized Network Resources and Functions
|
Efficient Management of Virtualized Information-Centric Networks Maxim Claeys, Steven Latré, Filip Turck |
42-46 |
Contributions to Efficient Resource Management in Virtual Networks Rashid Mijumbi, Juan-Luis Gorricho, Joan Serrat |
47-51 |
Management and Orchestration of Virtualized Network Functions Elisa Maini, Antonio Manzalini |
52-56 |
Ph.D. Student Workshop — Security Management
|
Towards Incentivizing ISPs to Mitigate Botnets Qasim Lone, Giovane Moura, Michel Eeten |
57-62 |
Enhancing Network Security: Host Trustworthiness Estimation Tomáš Jirsík, Pavel Čeleda |
63-68 |
Characterizing and Mitigating the DDoS-as-a-Service Phenomenon José Santanna, Anna Sperotto |
74-78 |
Experimental Studies for Security Management
|
Characterisation of the Kelihos.B Botnet Max Kerkers, José Santanna, Anna Sperotto |
79-91 |
Toward a Source Detection of Botclouds: A PCA-Based Approach Hammi Badis, Guillaume Doyen, Rida Khatoun |
105-117 |
Ph.D. Student Workshop — SDN and Content Delivery
|
Software Defined Networking to Improve Mobility Management Performance Morteza Karimzadeh, Anna Sperotto, Aiko Pras |
118-122 |
Future of DDoS Attacks Mitigation in Software Defined Networks Martin Vizváry, Jan Vykopal |
123-127 |
Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery Leonhard Nobach, David Hausheer |
128-132 |
Monitoring Methods for Quality-of-Service and Security
|
Goal-Oriented Monitoring Adaptation: Methodology and Patterns Antoine Toueir, Julien Broisin, Michelle Sibilla |
133-146 |
Detection of Network Flow Timestamp Reliability Martin Žádnik, Erik Šabik, Václav Bartoš |
147-159 |
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches Martin Drašar, Tomáš Jirsík, Martin Vizváry |
160-172 |
Ph.D. Student Workshop — Monitoring and Information Sharing
|
Next Generation Application-Aware Flow Monitoring Petr Velan, Pavel Čeleda |
173-178 |
A Modular Architecture for Deploying Self-adaptive Traffic Sampling João Silva, Paulo Carvalho, Solange Lima |
179-183 |
Cross-Layer Optimization with Real-Time Adaptive Dynamic Spectrum Management for Fourth Generation Broadband Access Networks Jeremy Eynde, Chris Blondia |
184-188 |