<?xml version="1.0" encoding="UTF-8"?><srw_dc:dc xmlns:srw_dc="info:srw/schema/1/dc-schema" xmlns:zs="http://docs.oasis-open.org/ns/search-ws/sruResponse" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="info:srw/schema/1/dc-schema http://www.loc.gov/standards/sru/resources/dc-schema.xsd">
  <title xmlns="http://purl.org/dc/elements/1.1/">Security of Networks and Services in an All-Connected World : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /</title>
  <creator xmlns="http://purl.org/dc/elements/1.1/">Badonnel, Rémi. editor.</creator>
  <creator xmlns="http://purl.org/dc/elements/1.1/">Koch, Robert. editor.</creator>
  <creator xmlns="http://purl.org/dc/elements/1.1/">Stiller, Burkhard. editor.</creator>
  <creator xmlns="http://purl.org/dc/elements/1.1/">Tuncer, Daphne. editor.</creator>
  <type xmlns="http://purl.org/dc/elements/1.1/">text</type>
  <language xmlns="http://purl.org/dc/elements/1.1/">eng</language>
  <description xmlns="http://purl.org/dc/elements/1.1/">This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.</description>
  <description xmlns="http://purl.org/dc/elements/1.1/">Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains.</description>
  <description xmlns="http://purl.org/dc/elements/1.1/">Description based on publisher-supplied MARC data.</description>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Application software.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Computer communication systems.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Computer security.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Computer system failures.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Computers and civilization.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Data structures (Computer science).</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Computer Communication Networks.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Computers and Society.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Data Structures and Information Theory.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Information Systems Applications (incl. Internet).</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">System Performance and Evaluation.</subject>
  <subject xmlns="http://purl.org/dc/elements/1.1/">Systems and Data Security.</subject>
  <relation xmlns="http://purl.org/dc/elements/1.1/">Security of networks and services in an all-connected world.</relation>
  <relation xmlns="http://purl.org/dc/elements/1.1/"/>
  <relation xmlns="http://purl.org/dc/elements/1.1/"/>
  <identifier xmlns="http://purl.org/dc/elements/1.1/">https://hdl.loc.gov/loc.gdc/gdcebookspublic.2019761901</identifier>
  <identifier xmlns="http://purl.org/dc/elements/1.1/">URN:ISBN:9783319607740</identifier>
  <rights xmlns="http://purl.org/dc/elements/1.1/"/>
  <rights xmlns="http://purl.org/dc/elements/1.1/">Creative Commons Attribution 4.0 International</rights>
</srw_dc:dc>
