05951 am 22009133u 450 99646646180331620230125203846.03-319-60774-X10.1007/978-3-319-60774-0(CKB)4340000000061583(DE-He213)978-3-319-60774-0(MiAaPQ)EBC5578552(Au-PeEL)EBL5578552(OCoLC)992973217(oapen)https://directory.doabooks.org/handle/20.500.12854/59096(PPN)202990931(EXLCZ)99434000000006158320170616d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSecurity of Networks and Services in an All-Connected World[electronic resource] 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller1st ed. 2017.Springer Nature2017Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XX, 192 p. 55 illus.) Computer Communication Networks and Telecommunications ;103563-319-60773-1 Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.Computer Communication Networks and Telecommunications ;10356Computer communication systemsComputer securityData structures (Computer science)Computer system failuresComputers and civilizationApplication softwareComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009System Performance and Evaluationhttps://scigraph.springernature.com/ontologies/product-market-codes/I13049Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040cyber crimenetwork securitydata securitywebanomaly detectionwirelesscloud computingartificial intelligenceinternetComputer communication systems.Computer security.Data structures (Computer science).Computer system failures.Computers and civilization.Application software.Computer Communication Networks.Systems and Data Security.Data Structures and Information Theory.System Performance and Evaluation.Computers and Society.Information Systems Applications (incl. Internet).004.6Daphne Tuncerauth1354800Tuncer Daphneedthttp://id.loc.gov/vocabulary/relators/edtKoch Robertedthttp://id.loc.gov/vocabulary/relators/edtBadonnel Rémiedthttp://id.loc.gov/vocabulary/relators/edtStiller Burkhardedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466461803316Security of Networks and Services in an All-Connected World3358276UNISA