Table of Contents
|
Management and Security in the Age of Hyperconnectivity Rémi Badonnel, Robert Koch, Aiko Pras, Martin Drašar, Burkhard Stiller |
Front Matter |
Autonomic and Smart Management
|
Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication Networks Janne Ali-Tolppa, Tsvetko Tsvetkov |
3-15 |
A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds Björn Richerzhagen, Alexander Wagener, Nils Richerzhagen, Rhaban Hark, Ralf Steinmetz |
16-29 |
Cloud Flat Rates Enabled via Fair Multi-resource Consumption Patrick Poullie, Burkhard Stiller |
30-44 |
PhD Student Workshop — Management of Future Networks
|
Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks Gioacchino Tangari, Marinos Charalambides, Daphné Tuncer, George Pavlou |
47-51 |
S3N - Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power Substations Erwin Leal, Juan Botero |
52-56 |
Towards a QoS-Oriented Migration Management Approach for Virtualized Networks Mahboobeh Zangiabady, Javier Rubio-Loyola |
57-61 |
Functional Decomposition in 5G Networks Davit Harutyunyan, Roberto Riggio |
62-67 |
Security Attacks and Defenses
|
An NFC Relay Attack with Off-the-shelf Hardware and Software Thomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller |
71-83 |
Analysis and Evaluation of OpenFlow Message Usage for Security Applications Sebastian Seeber, Gabi Rodosek, Gaëtan Hurel, Rémi Badonnel |
84-97 |
On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table Hoang Mai, Ngoc Nguyen, Guillaume Doyen, Alain Ploix, Remi Cogranne |
98-110 |
In Whom Do We Trust - Sharing Security Events Jessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras |
111-124 |
PhD Student Workshop — Security Management
|
Network Defence Using Attacker-Defender Interaction Modelling Jana Medková, Pavel Čeleda |
127-131 |
Evaluating Reputation of Internet Entities Václav Bartoš, Jan Kořenek |
132-136 |
Detecting Advanced Network Threats Using a Similarity Search Milan Čermák, Pavel Čeleda |
137-141 |
How to Achieve Early Botnet Detection at the Provider Level? Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras |
142-146 |
Anycast and Its Potential for DDoS Mitigation Wouter Vries, Ricardo Schmidt, Aiko Pras |
147-151 |
Short Papers — Methods for Management and Security
|
Context-Aware Location Management of Groups of Devices in 5G Networks Konstantinos Chatzikokolakis, Alexandros Kaloxylos, Panagiotis Spapis, Chan Zhou, Ömer Bulakci, Nancy Alonistioti |
155-159 |
Scalability and Information Exchange Among Autonomous Resource Management Agents Siri Fagernes, Alva Couch |
160-164 |
Analysis of Vertical Scans Discovered by Naive Detection Tomas Cejka, Marek Svepes |
165-169 |