Search Results - "Hunting"

Refine Results
  1. 1021
  2. 1022
  3. 1023
  4. 1024
  5. 1025
  6. 1026
  7. 1027
  8. 1028
  9. 1029
  10. 1030
  11. 1031
  12. 1032
  13. 1033
  14. 1034
  15. 1035
  16. 1036

    Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Swi...

    Published 2017
    Table of Contents: “…Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.…”
    Link to Metadata
    Electronic eBook
  17. 1037
  18. 1038
  19. 1039
  20. 1040