Filter your results
- 23
- 6
- 23
- 6
- 29
- 4
- 5
- 4
- 5
- 3
- 6
- 1
- 1
- 29
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 19
- 12
- 8
- 5
- 4
- 4
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Characterizing and Mitigating the DDoS-as-a-Service Phenomenon8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.74-78, ⟨10.1007/978-3-662-43862-6_10⟩
Conference papers
hal-01401293v1
|
||
|
Characterisation of the Kelihos.B Botnet8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.79-91, ⟨10.1007/978-3-662-43862-6_11⟩
Conference papers
hal-01401294v1
|
||
|
A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers
hal-01806063v1
|
||
|
Cooperative Database Caching within Cloud Environments6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.14-25, ⟨10.1007/978-3-642-30633-4_3⟩
Conference papers
hal-01529797v1
|
||
|
In Whom Do We Trust - Sharing Security Events10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, ⟨10.1007/978-3-319-39814-3_11⟩
Conference papers
hal-01632748v1
|
||
|
How to Achieve Early Botnet Detection at the Provider Level?10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.142-146, ⟨10.1007/978-3-319-39814-3_15⟩
Conference papers
hal-01632750v1
|
||
|
Playback Policies for Live and On-Demand P2P Video Streaming11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.15-28, ⟨10.1007/978-3-642-30054-7_2⟩
Conference papers
hal-01531950v1
|
||
|
How Asymmetric Is the Internet?9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.113-125, ⟨10.1007/978-3-319-20034-7_12⟩
Conference papers
hal-01410157v1
|
||
|
Security of Networks and Services in an All-Connected WorldSpringer International Publishing, LNCS-10356, 2017, Lecture Notes in Computer Science, 978-3-319-60773-3. ⟨10.1007/978-3-319-60774-0⟩
Books
hal-01806060v1
|
||
|
Software Defined Networking to Improve Mobility Management Performance8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.118-122, ⟨10.1007/978-3-662-43862-6_14⟩
Conference papers
hal-01401296v1
|
||
|
Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.136-147, ⟨10.1007/978-3-642-38998-6_17⟩
Conference papers
hal-01489963v1
|
||
|
Fair Allocation of Multiple Resources Using a Non-monetary Allocation Mechanism7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.45-48, ⟨10.1007/978-3-642-38998-6_6⟩
Conference papers
hal-01489969v1
|
||
|
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.129-133, ⟨10.1007/978-3-319-20034-7_13⟩
Conference papers
hal-01410159v1
|
||
|
Multi-domain DDoS Mitigation Based on Blockchains11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.185-190, ⟨10.1007/978-3-319-60774-0_19⟩
Conference papers
hal-01806051v1
|
||
|
Emerging Management Mechanisms for the Future InternetSpringer, LNCS-7943, 2013, Lecture Notes in Computer Science, 978-3-642-38997-9. ⟨10.1007/978-3-642-38998-6⟩
Books
hal-01489973v1
|
||
|
The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.94-107, ⟨10.1007/978-3-319-60774-0_7⟩
Conference papers
hal-01806061v1
|
||
|
Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and Services8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.1-14, ⟨10.1007/978-3-662-43862-6_1⟩
Conference papers
hal-01401280v1
|
||
|
The Design of a Single Funding Point Charging Architecture18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.148-160, ⟨10.1007/978-3-642-32808-4_14⟩
Conference papers
hal-01543145v1
|
||
|
Monitoring and Securing Virtualized Networks and ServicesSpringer, LNCS-8508, 2014, Lecture Notes in Computer Science, 978-3-662-43861-9. ⟨10.1007/978-3-662-43862-6⟩
Books
hal-01401308v1
|
||
|
Cloud Flat Rates Enabled via Fair Multi-resource Consumption10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.30-44, ⟨10.1007/978-3-319-39814-3_3⟩
Conference papers
hal-01632743v1
|
||
|
Management and Security in the Age of HyperconnectivitySpringer International Publishing, LNCS-9701, 2016, Lecture Notes in Computer Science, 978-3-319-39813-6. ⟨10.1007/978-3-319-39814-3⟩
Books
hal-01632740v1
|
||
|
Dependable Networks and ServicesSpringer, LNCS-7279, 2012, Lecture Notes in Computer Science, ⟨10.1007/978-3-642-30633-4⟩
Books
hal-01529791v1
|
||
|
SSHCure: A Flow-Based SSH Intrusion Detection System6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.86-97, ⟨10.1007/978-3-642-30633-4_11⟩
Conference papers
hal-01529782v1
|
||
|
Towards Bandwidth Estimation Using Flow-Level Measurements6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.127-138, ⟨10.1007/978-3-642-30633-4_18⟩
Conference papers
hal-01529783v1
|
||
|
Mechanisms for Autonomous Management of Networks and ServicesSpringer, LNCS-6155, 2010, Lecture Notes in Computer Science, 978-3-642-13985-7. ⟨10.1007/978-3-642-13986-4⟩
Books
hal-01555365v1
|
||
|
An SLA Support System for Cloud Computing5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.53-56, ⟨10.1007/978-3-642-21484-4_6⟩
Conference papers
hal-01585869v1
|
||
|
An NFC Relay Attack with Off-the-shelf Hardware and Software10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.71-83, ⟨10.1007/978-3-319-39814-3_8⟩
Conference papers
hal-01632735v1
|
||
|
Schengen Routing: A Compliance Analysis9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.100-112, ⟨10.1007/978-3-319-20034-7_11⟩
Conference papers
hal-01410156v1
|
||
|
Characterizing the IPv6 Security Landscape by Large-Scale Measurements9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.145-149, ⟨10.1007/978-3-319-20034-7_16⟩
Conference papers
hal-01410164v1
|