Skip to main content
Log in

Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)

Monitoring and Securing Virtualized Networks and Services

  • Report
  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

This article is a report of the IFIP AIMS 2014, which was held at Masaryk University, Czech Republic from June 30 to July 3, 2014. AIMS 2014 focused on the theme “Monitoring and Securing Virtualized Networks and Services”. The focus of the 2014 edition of the AIMS conference series was re-defined in comparison with earlier editions. AIMS 2014 positions itself in the network management community as an educational venue for Ph.D. students and young researchers. The AIMS program included hands-on tutorials and labs, a keynote, technical sessions and Ph.D. Workshop sessions, but also an educational session for training young academics on transversal topics. The highlights on each of the parts of the AIMS 2014 program are summarized in this article.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. AIMS 2014 Conference Web Site. http://www.aims-conference.org/2014/. Accessed July 2014

  2. IFIP TC6 Working Group 6: Management of Networks and Distributed Systems. http://www.simpleweb.org/ifip/. Accessed July 2014

  3. Flamingo European (ICT-FP7) Network of Excellence. http://www.fp7-flamingo.eu/. Accessed July 2014

  4. Saino, L., Cocora, C., Pavlou, G.: A toolchain for simplifying network simulation setup. In: Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques (SIMUTOOLS ’13), Brussels, Belgium (2013)

  5. Emulab—Network Emulation Testbed. http://www.emulab.net/. Accessed August 2014

  6. Fed4FIRE—Federation for Fire. http://www.fed4fire.eu/. Accessed August 2014

  7. POX—Python-based OpenFlow controller. http://www.noxrepo.org/pox/about-pox/. Accessed August 2014

  8. Open vSwitch—An Open Virtual Switch. http://openvswitch.org/. Accessed August 2014

  9. Kouřil, D., Rebok, T., Jirsík, T., Čegan, J., Drašar, M., Vizváry, M., Vykopal, J.: Cloud-based Testbed for Simulation of Cyber Attacks. In: Proceedings of the Network Operations and Management Symposium (NOMS 2014), Krakow, Poland (2014)

  10. KYPO—Cybernetic Proving Ground. http://www.muni.cz/ics/kypo. Accessed August 2014

  11. Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Stiller, B. (eds.): Proceedings of the 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014)—Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science (LNCS), vol. 8508. Springer (2014)

  12. Doyen, G., Waldburger, M., Sperotto, A., Čeleda, P., Gorricho, J.L., Schaaf, T., Serrat, J.: Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet. J. Netw. Syst. Manag. 22(2), 289–296 (2014)

  13. Almeroth, K.: Networking Conferences Statistics. http://www.cs.ucsb.edu/almeroth/conf/stats/#aims. Accessed July 2014

Download references

Acknowledgments

We would like to thank the many people who helped make AIMS 2014 such a high-quality and successful event. Firstly, many thanks are addressed to all the authors, who submitted their contributions to AIMS 2014, and to the tutorial and keynote speakers. The great review work performed by the members of both the AIMS TPC and the Ph.D. workshop TPC as well as additional reviewers is highly acknowledged. Additionally, many thanks to the local organizers Iva Krejčí, Alena Janebová, Jan Vykopal and Tomáš Jirsík for enabling the logistics and hosting the AIMS 2014 event. AIMS 2014 was supported by FLAMINGO, a Network of Excellence Project (318488).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anna Sperotto.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sperotto, A., Doyen, G., Latré, S. et al. Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014). J Netw Syst Manage 23, 794–802 (2015). https://doi.org/10.1007/s10922-015-9346-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-015-9346-8

Keywords

Navigation