03852nam 22007815 450 99646550450331620221017174247.03-642-22424-510.1007/978-3-642-22424-9(CKB)2670000000095966(SSID)ssj0000530759(PQKBManifestationID)11320818(PQKBTitleCode)TC0000530759(PQKBWorkID)10569183(PQKB)10625345(DE-He213)978-3-642-22424-9(MiAaPQ)EBC3066859(PPN)153869712(EXLCZ)99267000000009596620110620d2011 u| 0engurnn#008mamaatxtccrDetection of Intrusions and Malware, and Vulnerability Assessment[electronic resource] 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings /edited by Thorsten Holz, Herbert Bos1st ed. 2011.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2011.1 online resource (X, 235 p. 86 illus., 44 illus. in color.)Security and Cryptology ;6739Bibliographic Level Mode of Issuance: Monograph3-642-22423-7 Includes bibliographical references and index.This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41 initialĀ  submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.Security and Cryptology ;6739Computer communication systemsManagement information systemsComputer scienceData encryption (Computer science)Computers and civilizationApplication softwareAlgorithmsComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer communication systems.Management information systems.Computer science.Data encryption (Computer science).Computers and civilization.Application software.Algorithms.Computer Communication Networks.Management of Computing and Information Systems.Cryptology.Computers and Society.Information Systems Applications (incl. Internet).Algorithm Analysis and Problem Complexity.004.6Holz Thorstenedthttp://id.loc.gov/vocabulary/relators/edtBos Herbertedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465504503316Detection of Intrusions and Malware, and Vulnerability Assessment2071230UNISA