03690nam 22007575 450 991048422840332120200702234914.03-319-60876-210.1007/978-3-319-60876-1(CKB)4340000000061587(DE-He213)978-3-319-60876-1(MiAaPQ)EBC5576966(PPN)202990974(EXLCZ)99434000000006158720170603d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierDetection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings /edited by Michalis Polychronakis, Michael Meier1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (X, 412 p. 114 illus.) Security and Cryptology ;103273-319-60875-4 Includes bibliographical references and index.Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security. This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.Security and Cryptology ;10327Computer securityOperating systems (Computers)ComputersLaw and legislationComputers and civilizationApplication softwareData encryption (Computer science)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Legal Aspects of Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer security.Operating systems (Computers).Computers.Law and legislation.Computers and civilization.Application software.Data encryption (Computer science).Systems and Data Security.Operating Systems.Legal Aspects of Computing.Computers and Society.Information Systems Applications (incl. Internet).Cryptology.005.8Polychronakis Michalisedthttp://id.loc.gov/vocabulary/relators/edtMeier Michaeledthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484228403321Detection of Intrusions and Malware, and Vulnerability Assessment3395207UNINA