Filter your results
- 10
- 2
- 10
- 2
- 12
- 2
- 3
- 4
- 1
- 2
- 12
- 2
- 2
- 1
- 12
- 7
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Characterizing the IPv6 Security Landscape by Large-Scale Measurements9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.145-149, ⟨10.1007/978-3-319-20034-7_16⟩
Conference papers
hal-01410164v1
|
||
|
Mitigating DDoS Attacks Using OpenFlow-Based Software Defined Networking9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.129-133, ⟨10.1007/978-3-319-20034-7_13⟩
Conference papers
hal-01410159v1
|
||
|
Emerging Management Mechanisms for the Future InternetSpringer, LNCS-7943, 2013, Lecture Notes in Computer Science, 978-3-642-38997-9. ⟨10.1007/978-3-642-38998-6⟩
Books
hal-01489973v1
|
||
|
Characterizing and Mitigating the DDoS-as-a-Service Phenomenon8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.74-78, ⟨10.1007/978-3-662-43862-6_10⟩
Conference papers
hal-01401293v1
|
||
|
Characterisation of the Kelihos.B Botnet8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.79-91, ⟨10.1007/978-3-662-43862-6_11⟩
Conference papers
hal-01401294v1
|
||
|
Software Defined Networking to Improve Mobility Management Performance8th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2014, Brno, Czech Republic. pp.118-122, ⟨10.1007/978-3-662-43862-6_14⟩
Conference papers
hal-01401296v1
|
||
|
How Asymmetric Is the Internet?9th Autonomous Infrastructure, Management, and Security (AIMS), Jun 2015, Ghent, Belgium. pp.113-125, ⟨10.1007/978-3-319-20034-7_12⟩
Conference papers
hal-01410157v1
|
||
|
In Whom Do We Trust - Sharing Security Events10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.111-124, ⟨10.1007/978-3-319-39814-3_11⟩
Conference papers
hal-01632748v1
|
||
|
How to Achieve Early Botnet Detection at the Provider Level?10th IFIP International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2016, Munich, Germany. pp.142-146, ⟨10.1007/978-3-319-39814-3_15⟩
Conference papers
hal-01632750v1
|
||
|
Monitoring and Securing Virtualized Networks and ServicesSpringer, LNCS-8508, 2014, Lecture Notes in Computer Science, 978-3-662-43861-9. ⟨10.1007/978-3-662-43862-6⟩
Books
hal-01401308v1
|
||
|
SSHCure: A Flow-Based SSH Intrusion Detection System6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.86-97, ⟨10.1007/978-3-642-30633-4_11⟩
Conference papers
hal-01529782v1
|
||
|
Towards Bandwidth Estimation Using Flow-Level Measurements6th International Conference on Autonomous Infrastructure (AIMS), Jun 2012, Luxembourg, Luxembourg. pp.127-138, ⟨10.1007/978-3-642-30633-4_18⟩
Conference papers
hal-01529783v1
|