04309nam 22008175 450 99646586120331620200703075333.01-280-38778-597866135657093-642-14215-X10.1007/978-3-642-14215-4(CKB)2670000000028937(SSID)ssj0000446416(PQKBManifestationID)11285481(PQKBTitleCode)TC0000446416(PQKBWorkID)10497002(PQKB)10096323(DE-He213)978-3-642-14215-4(MiAaPQ)EBC3065497(PPN)149072902(EXLCZ)99267000000002893720100702d2010 u| 0engurnn#008mamaatxtccrDetection of Intrusions and Malware, and Vulnerability Assessment[electronic resource] 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings /edited by Christian Kreibich, Marko Jahnke1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (XII, 219 p. 55 illus.)Security and Cryptology ;6201Bibliographic Level Mode of Issuance: Monograph3-642-14214-1 Includes bibliographical references and index.Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS – Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks.Security and Cryptology ;6201Computer communication systemsData encryption (Computer science)Management information systemsComputer scienceComputers and civilizationApplication softwareAlgorithmsComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer communication systems.Data encryption (Computer science).Management information systems.Computer science.Computers and civilization.Application software.Algorithms.Computer Communication Networks.Cryptology.Management of Computing and Information Systems.Computers and Society.Information Systems Applications (incl. Internet).Algorithm Analysis and Problem Complexity.005.8Kreibich Christianedthttp://id.loc.gov/vocabulary/relators/edtJahnke Markoedthttp://id.loc.gov/vocabulary/relators/edtDIMVA 2010BOOK996465861203316Detection of Intrusions and Malware, and Vulnerability Assessment772293UNISA