000 03575nam a22006135i 4500
001 978-3-319-20034-7
003 DE-He213
005 20240730202408.0
007 cr nn 008mamaa
008 150603s2015 sz | s |||| 0|eng d
020 _a9783319200347
_9978-3-319-20034-7
024 7 _a10.1007/978-3-319-20034-7
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aIntelligent Mechanisms for Network Configuration and Security
_h[electronic resource] :
_b9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings /
_cedited by Steven Latré, Marinos Charalambides, Jérôme François, Corinna Schmitt, Burkhard Stiller.
250 _a1st ed. 2015.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXXII, 151 p. 47 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Communication Networks and Telecommunications,
_x2945-9184 ;
_v9122
505 0 _aAutonomic and decentralized management -- Management of future networking -- Security, privacy, and measurements -- Security management.
520 _aThis book constitutes the refereed proceedings of the 9th IFIP WG 6.6 International Conference on Intelligent Mechanisms for Network Configuration and Security, AIMS 2015, held in Ghent, Belgium, in June 2015. The 7 full papers presented in this book were carefully reviewed and selected from 22 submissions. The volume also includes 9 papers presented at the AIMS Ph.D. workshop. They were reviewed and selected from 24 submissions. The full papers are organized in topical sections on autonomic and decentralized management and security, privacy, and measurements. The workshop papers are organized in topical sections on management of future networking and security management.
650 0 _aComputer networks .
_931572
650 0 _aData protection.
_97245
650 0 _aElectronic data processing
_xManagement.
_9171236
650 0 _aApplication software.
_9171237
650 1 4 _aComputer Communication Networks.
_9171238
650 2 4 _aData and Information Security.
_931990
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputer and Information Systems Applications.
_9171239
700 1 _aLatré, Steven.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171240
700 1 _aCharalambides, Marinos.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171241
700 1 _aFrançois, Jérôme.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171242
700 1 _aSchmitt, Corinna.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171243
700 1 _aStiller, Burkhard.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9171244
710 2 _aSpringerLink (Online service)
_9171245
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319200330
776 0 8 _iPrinted edition:
_z9783319200354
830 0 _aComputer Communication Networks and Telecommunications,
_x2945-9184 ;
_v9122
_9171246
856 4 0 _uhttps://doi.org/10.1007/978-3-319-20034-7
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96995
_d96995