LEADER 05951 am 22009133u 450 001 996466461803316 005 20230125203846.0 010 $a3-319-60774-X 024 7 $a10.1007/978-3-319-60774-0 035 $a(CKB)4340000000061583 035 $a(DE-He213)978-3-319-60774-0 035 $a(MiAaPQ)EBC5578552 035 $a(Au-PeEL)EBL5578552 035 $a(OCoLC)992973217 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/59096 035 $a(PPN)202990931 035 $a(EXLCZ)994340000000061583 100 $a20170616d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity of Networks and Services in an All-Connected World$b[electronic resource] $e11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /$fedited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller 205 $a1st ed. 2017. 210 $cSpringer Nature$d2017 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XX, 192 p. 55 illus.) 225 1 $aComputer Communication Networks and Telecommunications ;$v10356 311 $a3-319-60773-1 327 $aMaking Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains. 330 $aThis book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure. 410 0$aComputer Communication Networks and Telecommunications ;$v10356 606 $aComputer communication systems 606 $aComputer security 606 $aData structures (Computer science) 606 $aComputer system failures 606 $aComputers and civilization 606 $aApplication software 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 610 $acyber crime 610 $anetwork security 610 $adata security 610 $aweb 610 $aanomaly detection 610 $awireless 610 $acloud computing 610 $aartificial intelligence 610 $ainternet 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aData structures (Computer science). 615 0$aComputer system failures. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aData Structures and Information Theory. 615 24$aSystem Performance and Evaluation. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a004.6 700 $aDaphne Tuncer$4auth$01354800 702 $aTuncer$b Daphne$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKoch$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBadonnel$b Rémi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStiller$b Burkhard$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466461803316 996 $aSecurity of Networks and Services in an All-Connected World$93358276 997 $aUNISA