LEADER 05951 am 22009133u 450 001 996466461803316 005 20230125203846.0 010 $a3-319-60774-X 024 7 $a10.1007/978-3-319-60774-0 035 $a(CKB)4340000000061583 035 $a(DE-He213)978-3-319-60774-0 035 $a(MiAaPQ)EBC5578552 035 $a(Au-PeEL)EBL5578552 035 $a(OCoLC)992973217 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/59096 035 $a(PPN)202990931 035 $a(EXLCZ)994340000000061583 100 $a20170616d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity of Networks and Services in an All-Connected World$b[electronic resource] $e11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /$fedited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller 205 $a1st ed. 2017. 210 $cSpringer Nature$d2017 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XX, 192 p. 55 illus.) 225 1 $aComputer Communication Networks and Telecommunications ;$v10356 311 $a3-319-60773-1 327 $aMaking Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains. 330 $aThis book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure. 410 0$aComputer Communication Networks and Telecommunications ;$v10356 606 $aComputer communication systems 606 $aComputer security 606 $aData structures (Computer science) 606 $aComputer system failures 606 $aComputers and civilization 606 $aApplication software 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 610 $acyber crime 610 $anetwork security 610 $adata security 610 $aweb 610 $aanomaly detection 610 $awireless 610 $acloud computing 610 $aartificial intelligence 610 $ainternet 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aData structures (Computer science). 615 0$aComputer system failures. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aData Structures and Information Theory. 615 24$aSystem Performance and Evaluation. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a004.6 700 $aDaphne Tuncer$4auth$01354800 702 $aTuncer$b Daphne$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKoch$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBadonnel$b Rémi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStiller$b Burkhard$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466461803316 996 $aSecurity of Networks and Services in an All-Connected World$93358276 997 $aUNISA LEADER 02019oam 22006134a 450 001 9910524885903321 005 20220205003246.0 010 $a1-61168-449-8 035 $a(CKB)3170000000060845 035 $a(EBL)1093557 035 $a(SSID)ssj0000873750 035 $a(PQKBManifestationID)11439514 035 $a(PQKBTitleCode)TC0000873750 035 $a(PQKBWorkID)10877451 035 $a(PQKB)10306808 035 $a(MiAaPQ)EBC1093557 035 $a(OCoLC)842881842 035 $a(MdBmJHUP)muse25311 035 $a(Au-PeEL)EBL1093557 035 $a(CaPaEBR)ebr10696023 035 $a(CaONFJC)MIL487139 035 $a(EXLCZ)993170000000060845 100 $a20121015d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aOn the Sleeve of the Visual$eRace as Face Value /$fAlessandra Raengo 205 $a1st [edition]. 210 1$aHanover, New Hampshire :$cDartmouth College Press,$d2013. 210 4$d©2013. 215 $a1 online resource (249 p.) 225 0 $aInterfaces: studies in visual culture 300 $aDescription based upon print version of record. 311 $a1-58465-975-0 320 $aIncludes bibliographical references and index. 327 $aThe photochemical imagination -- On the sleeve of the visual -- The money of the real -- The long photographic century -- Conclusion: in the shadow. 330 $aAn investigation of race and the ontology of the visual 410 0$aInterfaces: Studies in Visual Culture 606 $aImage (Philosophy) 606 $aVisual sociology 606 $aBlack people in mass media 615 0$aImage (Philosophy) 615 0$aVisual sociology. 615 0$aBlack people in mass media. 676 $a305.896 700 $aRaengo$b Alessandra$0782889 801 0$bMdBmJHUP 801 1$bMdBmJHUP 906 $aBOOK 912 $a9910524885903321 996 $aOn the sleeve of the visual$91738749 997 $aUNINA