Abstract is missing.
- Challenges in Critical Infrastructure SecurityCorrado Leita. 1 [doi]
- Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot SwarmNiels Bouten, Anna Hristoskova, Femke Ongenae, Jelle Nelis, Filip De Turck. 2-13 [doi]
- Cooperative Database Caching within Cloud EnvironmentsAndrei Vancea, Guilherme Sperb Machado, Laurent d'Orazio, Burkhard Stiller. 14-25 [doi]
- A Fuzzy Reinforcement Learning Approach for Pre-Congestion Notification Based Admission ControlStylianos Georgoulas, Klaus Moessner, Alexis Mansour, Menelaos Pissarides, Panagiotis Spapis. 26-37 [doi]
- Bridging the Gap: Towards an Adaptive Video Streaming Approach Supporting TransitionsJulius Rückert, David Hausheer. 38-41 [doi]
- A Multiaccess Enabled Load Balancing in Cognitive NetworksTeemu Rautio, Jukka Mäkelä. 42-45 [doi]
- Hardware Acceleration for Measurements in 100 Gb/s NetworksViktor Pus. 46-49 [doi]
- A Study of the RPL Repair Process Using ContikiRPLKevin Dominik Korte, Anuj Sehgal, Jürgen Schönwälder. 50-61 [doi]
- Traffic Measurement and Analysis of Building Automation and Control NetworksRadek Krejcí, Pavel Celeda, Jakub Dobrovolný. 62-73 [doi]
- SPRT for SPIT: Using the Sequential Probability Ratio Test for Spam in VoIP PreventionTobias Jung, Sylvain Martin, Damien Ernst, Guy Leduc. 74-85 [doi]
- SSHCure: A Flow-Based SSH Intrusion Detection SystemLaurens Hellemons, Luuk Hendriks, Rick Hofstede, Anna Sperotto, Ramin Sadre, Aiko Pras. 86-97 [doi]
- Instant Degradation of Anonymity in Low-Latency Anonymisation SystemsThorsten Ries, Radu State, Thomas Engel. 98-108 [doi]
- Real-Time and Resilient Intrusion Detection: A Flow-Based ApproachRick Hofstede, Aiko Pras. 109-112 [doi]
- Distributed Self-organized Collaboration of Autonomous IDS SensorsKarel Bartos, Martin Rehák. 113-117 [doi]
- Network Anomaly Detection: Comparison and Real-Time IssuesVáclav Bartos, Martin Zádník. 118-121 [doi]
- Detecting Anomalies in Netflow Record Time Series by Using a Kernel FunctionCynthia Wagner, Thomas Engel. 122-125 [doi]
- How to Build an IT Spin-Off CompanyJirí Tobola. 126 [doi]
- Towards Bandwidth Estimation Using Flow-Level MeasurementsRicardo de Oliveira Schmidt, Anna Sperotto, Ramin Sadre, Aiko Pras. 127-138 [doi]
- Flow-Based Identification of Failures Caused by IPv6 Transition MechanismsVaibhav Bajpai, Nikolay Melnikov, Anuj Sehgal, Jürgen Schönwälder. 139-150 [doi]
- Large Scale DNS AnalysisSamuel Marchal, Thomas Engel. 151-154 [doi]
- Flow Information Storage Assessment Using IPFIXcolPetr Velan, Radek Krejcí. 155-158 [doi]