![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
This volume of the Lecture Notes in Computer Science series contains the papers accepted for presentation at the Third International Conference on Autonomous - frastructure, Management and Security (AIMS 2009). The conference took place in Enschede, The Netherlands, hosted by the University of Twente. AIMS 2009 was - ganized and supported by the EC IST-EMANICS Network of Excellence (#26854) and co-sponsored by IFIP WG 6.6 and the Strategic Research Orientation of the University of Twente on Dependable Systems and Networks (DSN). AIMS 2009 constituted the Third edition of a single-track and standalone c- ference on management and security aspects of distributed and autonomous systems, which took place initially in Oslo, Norway in June 2007, followed by AIMS 2008 in Bremen, Germany. The theme of the AIMS 2009 conference was "Scalability of Networks and S- vices," focusing on how scalable networked systems can be monitored, managed, and protected in an ef cient and autonomous way. The research papers that have been - lected for publication in the present proceedings have approached this theme from d- ferent perspectives, covering topics such as network resource management, overlays andpeer-to-peernetworks,networkcon gurationandoptimization,andmonitoringand visualization.
The First International Workshop on Traffic Monitoring and Analysis (TMA 2009) was an initiative from the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (www.cost-tma.eu). The COST program is an intergovernmental framework for European Cooperation in Science and Technology, allowing the coordination of nationally funded research on a European level. Each COST Action contributes to reducing the fragmentation in research and opening the European Research Area to cooperation worldwide. Traffic monitoring and analysis (TMA) is now an important research topic within the field of networking. It involves many research groups worldwide that are coll- tively advancing our understanding of the Internet. The importance of TMA research is motivated by the fact that modern packet n- works are highly complex and ever-evolving objects. Understanding, developing and managing such environments is difficult and expensive in practice. Traffic monitoring is a key methodology for understanding telecommunication technology and improving its operation, and the recent advances in this field suggest that evolved TMA-based techniques can play a key role in the operation of real networks. Moreover, TMA offers a basis for prevention and response in network security, as typically the det- tion of attacks and intrusions requires the analysis of detailed traffic records. On the more theoretical side, TMA is an attractive research topic for many reasons.
This volume presents carefully revised texts of selected lectures given at the 13th EUNICE Open European Summer School and the proceedings of the conjoint IFIP TC6.6 Workshop on Dependable and Adaptable Networks and Services, EUNICE 2007, held at the University of Twente in Enschede, The Netherlands, in July 2007. The 17 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on middleware and supportive services, context-awareness, voice over IP, user behavior, security and legal aspects, performance aspects, and novel architectures.
This book constitutes the refereed proceedings of the 10th IFIP WG 6.6International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, held in Munich, Germany, in June 2016. The 7 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The volume also includes 9 papers presented at the AIMS PhD workshop. They were reviewed in a separate process and selected from 21 submissions. The full papers are organized in topical sections on autonomic and smart management and security attacks and defenses. The workshop papers are organized in topical sections on management of future networks and security management. The short papers deal with methods for management and security.
|
![]() ![]() You may like...
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter
Paperback
|