01047cam0-2200313---450-99000507736040332120090521125610.0000507736FED01000507736(Aleph)000507736FED0100050773619990604d1967----km-y0itay50------bagerATy-------001yy<<Der >>Synonymenreichtum der altfranzösischen DichterspracheVorgelegt in der Sitzung am 14. Dezember 1966Arnulf StefenelliWienBöhlaus Nachf.1967327 p.24 cmÖsterreichischen Akademie der WissenschaftenPhilosophisch- historische Klasse251Lingua franceseOrigini- Sec. 15.Sinonimi447.01Stefenelli,Arnulf203349ITUNINARICAUNIMARCBK990005077360403321447.01 STE 2Ist.f.m.14383FLFBCFLFBCSynonymenreichtum der altfranzösischen Dichtersprache531301UNINA01421aam 2200385I 450 991071077690332120160421112337.0GOVPUB-C13-057d038f373f88302e5d21f5d945b0bf(CKB)5470000002478535(OCoLC)947047509(EXLCZ)99547000000247853520160421d2005 ua 0engrdacontentrdamediardacarrierWeights and Measures Division quality manual for proficiency testing and interlaboratory comparisons /Jeff C. Gust; Georgia L. HarrisGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,2005.1 online resourceNISTIR ;72142005.Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.Title from PDF title page.Includes bibliographical references.Gust Jeff C1390356Gust Jeff C1390356Harris Georgia L1388137National Institute of Standards and Technology (U.S.)NBSNBSGPOBOOK9910710776903321Weights and Measures Division quality manual for proficiency testing and interlaboratory comparisons3496800UNINA04628nam 22008175 450 991041344530332120251225183441.03-030-52683-610.1007/978-3-030-52683-2(CKB)4100000011343331(DE-He213)978-3-030-52683-2(MiAaPQ)EBC6270546(PPN)255011989(EXLCZ)99410000001134333120200703d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDetection of Intrusions and Malware, and Vulnerability Assessment 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings /edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) Security and Cryptology,2946-1863 ;12223Includes index.3-030-52682-8 Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. *The conference was held virtually due to the COVID-19 pandemic.Security and Cryptology,2946-1863 ;12223Data protectionComputer networksComputer engineeringCryptographyData encryption (Computer science)Software engineeringComputersLaw and legislationInformation technologyLaw and legislationData and Information SecurityComputer Communication NetworksComputer Engineering and NetworksCryptologySoftware EngineeringLegal Aspects of ComputingData protection.Computer networks.Computer engineering.Cryptography.Data encryption (Computer science).Software engineering.ComputersLaw and legislation.Information technologyLaw and legislation.Data and Information Security.Computer Communication Networks.Computer Engineering and Networks.Cryptology.Software Engineering.Legal Aspects of Computing.005.8005.8Maurice Clémentineedthttp://id.loc.gov/vocabulary/relators/edtBilge Leylaedthttp://id.loc.gov/vocabulary/relators/edtStringhini Gianlucaedthttp://id.loc.gov/vocabulary/relators/edtNeves Nunoedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910413445303321Detection of Intrusions and Malware, and Vulnerability Assessment3395207UNINA