Filter your results
- 29
- 6
- 29
- 6
- 35
- 5
- 6
- 3
- 3
- 4
- 9
- 4
- 1
- 35
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 19
- 17
- 9
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
An NFC Relay Attack with Off-the-shelf Hardware and Software10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.71-83, ⟨10.1007/978-3-319-39814-3_8⟩
Conference papers
hal-01632735v1
|
||
|
Schengen Routing: A Compliance Analysis9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.100-112, ⟨10.1007/978-3-319-20034-7_11⟩
Conference papers
hal-01410156v1
|
||
|
Characterizing the IPv6 Security Landscape by Large-Scale Measurements9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.145-149, ⟨10.1007/978-3-319-20034-7_16⟩
Conference papers
hal-01410164v1
|
||
|
Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.136-147, ⟨10.1007/978-3-642-38998-6_17⟩
Conference papers
hal-01489963v1
|
||
|
Fair Allocation of Multiple Resources Using a Non-monetary Allocation Mechanism7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.45-48, ⟨10.1007/978-3-642-38998-6_6⟩
Conference papers
hal-01489969v1
|
||
|
Finding and Analyzing Evil Cities on the Internet5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.38-48, ⟨10.1007/978-3-642-21484-4_4⟩
Conference papers
hal-01585870v1
|
||
|
Multi-domain DDoS Mitigation Based on Blockchains11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.185-190, ⟨10.1007/978-3-319-60774-0_19⟩
Conference papers
hal-01806051v1
|
||
|
Emerging Management Mechanisms for the Future InternetSpringer, LNCS-7943, 2013, Lecture Notes in Computer Science, 978-3-642-38997-9. ⟨10.1007/978-3-642-38998-6⟩
Books
hal-01489973v1
|
||
|
Playback Policies for Live and On-Demand P2P Video Streaming11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.15-28, ⟨10.1007/978-3-642-30054-7_2⟩
Conference papers
hal-01531950v1
|
||
|
How Asymmetric Is the Internet?9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.113-125, ⟨10.1007/978-3-319-20034-7_12⟩
Conference papers
hal-01410157v1
|
||
|
In Whom Do We Trust - Sharing Security Events10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, ⟨10.1007/978-3-319-39814-3_11⟩
Conference papers
hal-01632748v1
|
||
|
How to Achieve Early Botnet Detection at the Provider Level?10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.142-146, ⟨10.1007/978-3-319-39814-3_15⟩
Conference papers
hal-01632750v1
|
||
|
A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.16-29, ⟨10.1007/978-3-319-60774-0_2⟩
Conference papers
hal-01806063v1
|
||
|
Cooperative Database Caching within Cloud Environments6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.14-25, ⟨10.1007/978-3-642-30633-4_3⟩
Conference papers
hal-01529797v1
|
||
|
The Costs of Web Advertisements While Mobile Browsing18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.412-422, ⟨10.1007/978-3-642-32808-4_38⟩
Conference papers
hal-01543147v1
|
||
|
Flow-Based Detection of IPv6-specific Network Layer Attacks11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.137-142, ⟨10.1007/978-3-319-60774-0_11⟩
Conference papers
hal-01806050v1
|
||
|
The Impact of IPv6 on Penetration Testing18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.88-99, ⟨10.1007/978-3-642-32808-4_9⟩
Conference papers
hal-01543169v1
|
||
|
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.109-112, ⟨10.1007/978-3-642-30633-4_13⟩
Conference papers
hal-01529793v1
|
||
|
Security of Networks and Services in an All-Connected WorldSpringer International Publishing, LNCS-10356, 2017, Lecture Notes in Computer Science, 978-3-319-60773-3. ⟨10.1007/978-3-319-60774-0⟩
Books
hal-01806060v1
|
||
|
Software Defined Networking to Improve Mobility Management Performance8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.118-122, ⟨10.1007/978-3-662-43862-6_14⟩
Conference papers
hal-01401296v1
|
||
|
The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications11th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jul 2017, Zurich, Switzerland. pp.94-107, ⟨10.1007/978-3-319-60774-0_7⟩
Conference papers
hal-01806061v1
|
||
|
Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and Services8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.1-14, ⟨10.1007/978-3-662-43862-6_1⟩
Conference papers
hal-01401280v1
|
||
|
Monitoring and Securing Virtualized Networks and ServicesSpringer, LNCS-8508, 2014, Lecture Notes in Computer Science, 978-3-662-43861-9. ⟨10.1007/978-3-662-43862-6⟩
Books
hal-01401308v1
|
||
|
The Design of a Single Funding Point Charging Architecture18th European Conference on Information and Communications Technologies (EUNICE), Aug 2012, Budapest, Hungary. pp.148-160, ⟨10.1007/978-3-642-32808-4_14⟩
Conference papers
hal-01543145v1
|
||
|
Self-management of Hybrid Networks – Hidden Costs Due to TCP Performance Problems19th Open European Summer School (EUNICE), Aug 2013, Chemnitz, Germany. pp.54-65, ⟨10.1007/978-3-642-40552-5_6⟩
Conference papers
hal-01497037v1
|
||
|
Anycast and Its Potential for DDoS Mitigation10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.147-151, ⟨10.1007/978-3-319-39814-3_16⟩
Conference papers
hal-01632736v1
|
||
|
Cloud Flat Rates Enabled via Fair Multi-resource Consumption10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.30-44, ⟨10.1007/978-3-319-39814-3_3⟩
Conference papers
hal-01632743v1
|
||
|
Carrier Ethernet OAM: An Overview and Comparison to IP OAM5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.112-123, ⟨10.1007/978-3-642-21484-4_14⟩
Conference papers
hal-01585853v1
|
||
|
Estimating Bandwidth Requirements Using Flow-Level Measurements5th Autonomous Infrastructure, Management and Security (AIMS), Jun 2011, Nancy, France. pp.169-172, ⟨10.1007/978-3-642-21484-4_20⟩
Conference papers
hal-01585862v1
|
||
|
Management and Security in the Age of HyperconnectivitySpringer International Publishing, LNCS-9701, 2016, Lecture Notes in Computer Science, 978-3-319-39813-6. ⟨10.1007/978-3-319-39814-3⟩
Books
hal-01632740v1
|
- 1
- 2