Intelligent Mechanisms for Network Configuration and Security.pdf
(
4740 KB
)
Pobierz
Steven Latré
Marinos Charalambides
Jérôme François
Corinna Schmitt
Burkhard Stiller
(Eds.)
Intelligent Mechanisms
for Network Configuration
and Security
9th IFIP WG 6.6 International Conference
on Autonomous Infrastructure, Management, and Security, AIMS 2015
Ghent, Belgium, June 22–25, 2015, Proceedings
LNCS 9122
123
Lecture Notes in Computer Science
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen
9122
Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zürich, Zürich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7411
Steven Latré
·
Marinos Charalambides
Jérôme François
·
Corinna Schmitt
Burkhard Stiller (Eds.)
Intelligent Mechanisms
for Network Configuration
and Security
9th IFIP WG 6.6 International Conference
on Autonomous Infrastructure,
Management, and Security, AIMS 2015
Ghent, Belgium, June 22–25, 2015
Proceedings
ABC
Editors
Steven Latré
Universiteit Antwerp
Antwerp
Belgium
Marinos Charalambides
University College London
London
UK
Jérôme François
Inria Nancy Grand Est
Villers-lès-Nancy
France
Corinna Schmitt
Universität Zürich
Zürich
Switzerland
Burkhard Stiller
Universität Zürich
Zürich
Switzerland
ISSN 0302-9743
ISSN 1611-3349 (electronic)
Lecture Notes in Computer Science
ISBN 978-3-319-20033-0
ISBN 978-3-319-20034-7 (eBook)
DOI 10.1007/978-3-319-20034-7
Library of Congress Control Number: 2015940762
LNCS Sublibrary: SL5 – Computer Communication Networks and Telecommunications
Springer Cham Heidelberg New York Dordrecht London
c IFIP International Federation for Information Processing 2015
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information stor-
age and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made.
Printed on acid-free paper
Springer International Publishing AG Switzerland is part of Springer Science+Business Media
(www.springer.com)
Plik z chomika:
jacek_040
Inne pliki z tego folderu:
Exploiting Web-Based Applications - FREE Video Training Course PART 1.rar
(506812 KB)
Exploiting Web-Based Applications - FREE Video Training Course PART 2.rar
(933817 KB)
50 Android Hacks.pdf
(3465 KB)
50 Reasons For Mastering Penetration Testing.azw3
(171 KB)
610.1 - Malware Analysis Fundamentals.pdf
(31650 KB)
Inne foldery tego chomika:
Zgłoś jeśli
naruszono regulamin