Abstract is missing.
- Network Element Stability Aware Method for Verifying Configuration Changes in Mobile Communication NetworksJanne Ali-Tolppa, Tsvetko Tsvetkov. 3-15 [doi]
- A Framework for Publish/Subscribe Protocol Transitions in Mobile CrowdsBjörn Richerzhagen, Alexander Wagener, Nils Richerzhagen, Rhaban Hark, Ralf Steinmetz. 16-29 [doi]
- Cloud Flat Rates Enabled via Fair Multi-resource ConsumptionPatrick Poullie, Burkhard Stiller. 30-44 [doi]
- Decentralized Solutions for Monitoring Large-Scale Software-Defined NetworksGioacchino Tangari, Marinos Charalambides, Daphné Tuncer, George Pavlou. 47-51 [doi]
- S3N - Smart Solution for Substation Networks, an Architecture for the Management of Communication Networks in Power SubstationsErwin Alexander Leal, Juan Felipe Botero. 52-56 [doi]
- Towards a QoS-Oriented Migration Management Approach for Virtualized NetworksMahboobeh Zangiabady, Javier Rubio-Loyola. 57-61 [doi]
- Functional Decomposition in 5G NetworksDavit Harutyunyan, Roberto Riggio. 62-67 [doi]
- An NFC Relay Attack with Off-the-shelf Hardware and SoftwareThomas Bocek, Christian Killer, Christos Tsiaras, Burkhard Stiller. 71-83 [doi]
- Analysis and Evaluation of OpenFlow Message Usage for Security ApplicationsSebastian Seeber, Gabi Dreo Rodosek, Gaëtan Hurel, Rémi Badonnel. 84-97 [doi]
- On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest TableHoang Long Mai, Ngoc Tan Nguyen, Guillaume Doyen, Alain Ploix, Rémi Cogranne. 98-110 [doi]
- In Whom Do We Trust - Sharing Security EventsJessica Steinberger, Benjamin Kuhnert, Anna Sperotto, Harald Baier, Aiko Pras. 111-124 [doi]
- Network Defence Using Attacker-Defender Interaction ModellingJana Medková, Pavel Celeda. 127-131 [doi]
- Evaluating Reputation of Internet EntitiesVáclav Bartos, Jan Korenek. 132-136 [doi]
- Detecting Advanced Network Threats Using a Similarity SearchMilan Cermák, Pavel Celeda. 137-141 [doi]
- How to Achieve Early Botnet Detection at the Provider Level?Christian Dietz, Anna Sperotto, Gabi Dreo, Aiko Pras. 142-146 [doi]
- Anycast and Its Potential for DDoS MitigationWouter B. de Vries, Ricardo de Oliveira Schmidt, Aiko Pras. 147-151 [doi]
- Context-Aware Location Management of Groups of Devices in 5G NetworksKonstantinos Chatzikokolakis, Alexandros Kaloxylos, Panagiotis Spapis, Chan Zhou, Ömer Bulakci, Nancy Alonistioti. 155-159 [doi]
- Scalability and Information Exchange Among Autonomous Resource Management AgentsSiri Fagernes, Alva L. Couch. 160-164 [doi]
- Analysis of Vertical Scans Discovered by Naive DetectionTomás Cejka, Marek Svepes. 165-169 [doi]