Atjaunināt sīkdatņu piekrišanu

E-grāmata: Dependable Networks and Services: 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, June 4-8, 2012, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 7279
  • Izdošanas datums: 31-May-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642306334
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 7279
  • Izdošanas datums: 31-May-2012
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642306334

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, held in Luxembourg in June 2012. The 10 full papers presented were carefully reviewed and selected from 23 submissions. They cover autonomic and distributed management, network security, network monitoring, and special environments and Internet of Things. In addition, this book contains 9 workshop papers which were selected from 18 submissions. They deal with high-speed networks and network management, intrusion detection, and network monitoring and security.
Keynote
Challenges in Critical Infrastructure Security (Abstract)
1(1)
Corrado Leita
Autonomic and Distributed Network Management
Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm
2(12)
Niels Bouten
Anna Hristoskova
Femke Ongenae
Jelle Nelis
Filip De Turck
Cooperative Database Caching within Cloud Environments
14(12)
Andrei Vancea
Guilherme Sperb Machado
Laurent d'Orazio
Burkhard Stiller
A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission Control
26(12)
Stylianos Georgoulas
Klaus Moessner
Alexis Mansour
Menelaos Pissarides
Panagiotis Spapis
PhD Workshop---High-Speed Networks and Network Management
Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting Transitions
38(4)
Julius Ruckert
David Hausheer
A Multiaccess Enabled Load Balancing in Cognitive Networks
42(4)
Teemu Rautio
Jukka Makela
Hardware Acceleration for Measurements in 100 Gb/s Networks
46(4)
Viktor Pus
Special Environments and Internet of Things
A Study of the RPL Repair Process Using ContikiRPL
50(12)
Kevin Dominik Korte
Anuj Sehgal
Jurgen Schonwalder
Traffic Measurement and Analysis of Building Automation and Control Networks
62(12)
Radek Krejci
Pavel Celeda
Jakub Dobrovolny
Network Security
SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP Prevention
74(12)
Tobias Jung
Sylvain Martin
Damien Ernst
Guy Leduc
SSHCure: A Flow-Based SSH Intrusion Detection System
86(12)
Laurens Hellemons
Luuk Hendriks
Rick Hofstede
Anna Sperotto
Ramin Sadre
Aiko Pras
Instant Degradation of Anonymity in Low-Latency Anonymisation Systems
98(11)
Thorsten Ries
Radu State
Thomas Engel
PhD Workshop---Intrusion Detection
Real-Time and Resilient Intrusion Detection: A Flow-Based Approach
109(4)
Rick Hofstede
Aiko Pras
Distributed Self-organized Collaboration of Autonomous IDS Sensors
113(5)
Karel Bartos
Martin Rehak
Network Anomaly Detection: Comparison and Real-Time Issues
118(4)
Vaclav Bartos
Martin Zadnik
Detecting Anomalies in Netflow Record Time Series by Using a Kernel Function
122(4)
Cynthia Wagner
Thomas Engel
Keynote
How to Build an IT Spin-Off Company (Abstract)
126(1)
Jiri Tobola
Network Load and Failure Monitoring
Towards Bandwidth Estimation Using Flow-Level Measurements
127(12)
Ricardo de O. Schmidt
Anna Sperotto
Ramin Sadre
Aiko Pras
Flow-Based Identification of Failures Caused by IPv6 Transition Mechanisms
139(12)
Vaibhav Bajpai
Nikolay Melnikov
Anuj Sehgal
Jurgen Schonwalder
PhD Workshop---Network Monitoring and Security
Large Scale DNS Analysis
151(4)
Samuel Marchal
Thomas Engel
Flow Information Storage Assessment Using IPFIXcol
155(4)
Petr Velan
Radek Krejci
Orbituary 159(2)
Author Index 161