| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910144348403321 |
|
|
Titolo |
Recent Advances in Intrusion Detection : 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004, Proceedings / / edited by Erland Jonsson, Alfonso Valdes, Magnus Almgren |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2004.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 322 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 3224 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Management information systems |
Computer science |
Data encryption (Computer science) |
Computer security |
Computers and civilization |
Computer networks |
Operating systems (Computers) |
Management of Computing and Information Systems |
Cryptology |
Systems and Data Security |
Computers and Society |
Computer Communication Networks |
Operating Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Modelling Process Behaviour -- Automatic Extraction of Accurate Application-Specific Sandboxing Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths -- Detecting Worms and Viruses -- HoneyStat: Local Worm Detection Using Honeypots -- Fast Detection of Scanning Worm Infections -- Detecting Unknown Massive Mailing Viruses Using |
|
|
|
|
|
|
|
|
|
|
|
Proactive Methods -- Attack and Alert Analysis -- Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection -- Attack Analysis and Detection for Ad Hoc Routing Protocols -- On the Design and Use of Internet Sinks for Network Abuse Monitoring -- Practical Experience -- Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information -- Symantec Deception Server Experience with a Commercial Deception System -- Anomaly Detection -- Anomalous Payload-Based Network Intrusion Detection -- Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix -- Seurat: A Pointillist Approach to Anomaly Detection -- Formal Analysis for Intrusion Detection -- Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds -- Formal Reasoning About Intrusion Detection Systems -- RheoStat: Real-Time Risk Management. |
|
|
|
|
|
|
Sommario/riassunto |
|
On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15–17, 2004. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial perspectives. We also encouraged discussions that - dressed issues that arise when studying intrusion detection, including infor- tion gathering and monitoring, from a wider perspective. Thus, we had sessions on detection of worms and viruses, attack analysis, and practical experience reports. The RAID 2004 Program Committee received 118 paper submissions from all over the world. All submissions were carefully reviewed by several members of the Program Committee and selection was made on the basis of scienti?c novelty, importance to the ?eld, and technical quality. Final selection took place at a meeting held May 24 in Paris, France. Fourteen papers and two practical experience reports were selected for presentation and publication in the conf- ence proceedings. In addition, a number of papers describing work in progress were selected for presentation at the symposium. The keynote addresswas given by Bruce Schneier of Counterpane Systems. H? akan Kvarnstrom ¨ of TeliaSonera gave an invited talk on the topic “Fighting Fraud in Telecom Environments. ” A successful symposium is the result of the joint e?ort of many people. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910963385403321 |
|
|
Autore |
Raykov Tenko |
|
|
Titolo |
A first course in structural equation modeling / / Tenko Raykov and George A. Marcoulides |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Mahwah, NJ, : Lawrence Erlbaum Associates, Publishers, 2006 |
|
|
|
|
|
|
|
ISBN |
|
1-135-60076-7 |
1-281-07603-1 |
1-135-10923-0 |
9786611076030 |
0-203-93068-1 |
1-4294-6298-1 |
|
|
|
|
|
|
|
|
Edizione |
[2nd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (249 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Structural equation modeling |
Social sciences - Statistical methods |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. 227-231) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; A First Course in Structural Equation Modeling; Copyright; Contents; Preface to the Second Edition; CHAPTER ONE Fundamentals of StructuralEquation Modeling; WHAT IS STRUCTURAL EQUATION MODELING?; PATH DIAGRAMS; RULES FOR DETERMINING MODEL PARAMETERS; PARAMETER ESTIMATION; PARAMETER AND MODEL IDENTIFICATION; MODEL-TESTING AND -FIT EVALUATION; APPENDIX TO CHAPTER 1; CHAPTER TWO Getting to Know the EQS,LISREL, and Mplus Programs; STRUCTURE OF INPUT FILES FOR SEM SOFTWARE; INTRODUCTION TO THE EQS NOTATION AND SYNTAX; INTRODUCTION TO THE LISREL NOTATION AND SYNTAX |
INTRODUCTION TO THE Mplus NOTATION AND SYNTAXCHAPTER THREE Path Analysis; WHAT IS PATH ANALYSIS?; EXAMPLE PATH ANALYSIS MODEL; EQS, LISREL, AND Mplus INPUT FILES; MODELING RESULTS; TESTING MODEL RESTRICTIONS IN SEM; MODEL MODIFICATIONS; APPENDIX TO CHAPTER 3; CHAPTER FOUR Confirmatory Factor Analysis; WHAT IS FACTOR ANALYSIS?; AN EXAMPLE CONFIRMATORY FACTOR |
|
|
|
|
|
|
|
|
|
|
|
ANALYSIS MODEL; EQS, LISREL, and Mplus COMMAND FILES; MODELING RESULTS; TESTING MODEL RESTRICTIONS: TRUE SCORE EQUIVALENCE; APPENDIX TO CHAPTER 4; CHAPTER FIVE Structural Regression Models; WHAT IS A STRUCTURAL REGRESSION MODEL? |
AN EXAMPLE STRUCTURAL REGRESSION MODELEQS, LISREL, AND Mplus COMMAND FILES; MODELING RESULTS; FACTORIAL INVARIANCE ACROSS TIME IN REPEATED MEASURE STUDIES; APPENDIX TO CHAPTER 5; CHAPTER SIX Latent Change Analysis; WHAT IS LATENT CHANGE ANALYSIS?; ONE-FACTOR LATENT CHANGE ANALYSIS MODEL; EQS, LISREL, AND Mplus COMMAND FILES FOR A ONE-FACTOR LCA MODEL; MODELING RESULTS, ONE-FACTOR LCA MODEL; LEVEL AND SHAPE MODEL; EQS, LISREL, AND Mplus COMMAND FILES, LEVEL AND SHAPE MODEL; MODELING RESULTS FOR THE LEVEL AND SHAPE MODEL; STUDYING CORRELATES AND PREDICTORS OF LATENT CHANGE |
APPENDIX TO CHAPTER 6Epilogue; References; Author Index; Subject Index |
|
|
|
|
|
|
Sommario/riassunto |
|
In this book, authors Tenko Raykov and George A. Marcoulides introduce students to the basics of structural equation modeling (SEM) through a conceptual, nonmathematical approach. For ease of understanding, the few mathematical formulas presented are used in a conceptual or illustrative nature, rather than a computational one.Featuring examples from EQS, LISREL, and Mplus, A First Course in Structural Equation Modeling is an excellent beginner's guide to learning how to set up input files to fit the most commonly used types of structural equation models with these programs. The basic |
|
|
|
|
|
|
|
| |