Abstract is missing.
- Trade-off-based Adoption Methodology for Cloud-Based Infrastructures and ServicesRadhika Garg, Burkhard Stiller. 1-14 [doi]
- ESPRESSO: An Encryption as a Service for Cloud Storage SystemsSeungmin Kang, Bharadwaj Veeravalli, Khin Mi Mi Aung. 15-28 [doi]
- Adaptive CUSUM Algorithm to Detect Malicious Behaviors in Wireless Mesh NetworksJuliette Dromard, Rida Khatoun, Lyes Khoukhi. 29-41 [doi]
- Efficient Management of Virtualized Information-Centric NetworksMaxim Claeys, Steven Latré, Filip De Turck. 42-46 [doi]
- Contributions to Efficient Resource Management in Virtual NetworksRashid Mijumbi, Juan-Luis Gorricho, Joan Serrat. 47-51 [doi]
- Management and Orchestration of Virtualized Network FunctionsElisa Maini, Antonio Manzalini. 52-56 [doi]
- Towards Incentivizing ISPs to Mitigate BotnetsQasim Lone, Giovane C. M. Moura, Michel van Eeten. 57-62 [doi]
- Enhancing Network Security: Host Trustworthiness EstimationTomás Jirsík, Pavel Celeda. 63-68 [doi]
- Outsourcing Mobile Security in the CloudGaëtan Hurel, Remi Badonnel, Abdelkader Lahmadi, Olivier Festor. 69-73 [doi]
- Characterizing and Mitigating the DDoS-as-a-Service PhenomenonJosé Jair Santanna, Anna Sperotto. 74-78 [doi]
- Characterisation of the Kelihos.B BotnetMax Kerkers, José Jair Santanna, Anna Sperotto. 79-91 [doi]
- A Study of RPL DODAG Version AttacksAnthéa Mayzaud, Anuj Sehgal, Remi Badonnel, Isabelle Chrisment, Jürgen Schönwälder. 92-104 [doi]
- Toward a Source Detection of Botclouds: A PCA-Based ApproachBadis Hammi, Guillaume Doyen, Rida Khatoun. 105-117 [doi]
- Software Defined Networking to Improve Mobility Management PerformanceMorteza Karimzadeh, Anna Sperotto, Aiko Pras. 118-122 [doi]
- Future of DDoS Attacks Mitigation in Software Defined NetworksMartin Vizváry, Jan Vykopal. 123-127 [doi]
- Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content DeliveryLeonhard Nobach, David Hausheer. 128-132 [doi]
- Goal-Oriented Monitoring Adaptation: Methodology and PatternsAntoine Toueir, Julien Broisin, Michelle Sibilla. 133-146 [doi]
- Detection of Network Flow Timestamp ReliabilityMartin Zádník, Erik Sabik, Václav Bartos. 147-159 [doi]
- Enhancing Network Intrusion Detection by Correlation of Modularly Hashed SketchesMartin Drasar, Tomás Jirsík, Martin Vizváry. 160-172 [doi]
- Next Generation Application-Aware Flow MonitoringPetr Velan, Pavel Celeda. 173-178 [doi]
- A Modular Architecture for Deploying Self-adaptive Traffic SamplingJoão Marco C. Silva, Paulo Carvalho, Solange Rito Lima. 179-183 [doi]
- Cross-Layer Optimization with Real-Time Adaptive Dynamic Spectrum Management for Fourth Generation Broadband Access NetworksJeremy Van den Eynde, Chris Blondia. 184-188 [doi]