Abstract is missing.
- Threat Identification Using Active DNS MeasurementsOlivier van der Toorn, Anna Sperotto. 1-5 [doi]
- Threat Detection Through Correlation ofNetwork Flows and LogsStanislav Spacek, Pavel Celeda. 6-10 [doi]
- Botnet Detection in Anonymous NetworksKatharina Kuhnert, Jessica Steinberger, Harald Baier. 11-15 [doi]
- Black Box Attacks using Adversarial Samples against Machine Learning Malware Classification to Improve DetectionRaphael Labaca Castro, Gabi Dreo Rodosek. 16-20 [doi]
- Enhanced Flow Monitoring with P4 Generated Flexible Packet ParserTomás Cejka, Petr Velan, Jirí Havránek, Pavel Benácek. 21-32 [doi]
- Throttling Malware Families in 2DMohamed Nassar 0001, Haïdar Safa. 33-45 [doi]
- Data Privacy Protection - Concealing Text and Audio with a DNA-inspired AlgorithmPaulo Silva, Lukas Kencl, Edmundo Monteiro. 46-59 [doi]
- Towards an Independent and Resilient DNSMoritz Müller, Roland van Rijswijk-Deij. 60-64 [doi]
- RAN Slicing Framework and Resource Allocation in Multi-domain Heterogeneous NetworksGodfrey kibalya, Joan Serrat 0001, Juan-Luis Gorricho. 65-69 [doi]
- Leveraging Smart Contracts for Automatic SLA Compensation - The Case of NFV EnvironmentsEder John Scheid, Burkhard Stiller. 70-74 [doi]
- Towards European Network SovereigntyNils Rodday, Aiko Pras, Gabi Dreo Rodosek. 75-78 [doi]