03993nam 22007335 450 99646598770331620200706155914.03-540-36017-410.1007/11790754(CKB)1000000000283809(SSID)ssj0000317178(PQKBManifestationID)11232417(PQKBTitleCode)TC0000317178(PQKBWorkID)10287193(PQKB)10112798(DE-He213)978-3-540-36017-9(MiAaPQ)EBC3068119(PPN)123136555(EXLCZ)99100000000028380920100301d2006 u| 0engurnn|008mamaatxtccrDetection of Intrusions and Malware, and Vulnerability Assessment[electronic resource] Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings /edited by Roland Büschkes, Pavel Laskov1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (X, 195 p.) Security and Cryptology ;4064Bibliographic Level Mode of Issuance: Monograph3-540-36014-X Includes bibliographical references and index.Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network–Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.Security and Cryptology ;4064Data encryption (Computer science)Management information systemsComputer scienceComputer communication systemsOperating systems (Computers)Computers and civilizationCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Data encryption (Computer science).Management information systems.Computer science.Computer communication systems.Operating systems (Computers).Computers and civilization.Cryptology.Management of Computing and Information Systems.Computer Communication Networks.Operating Systems.Computers and Society.005.8Büschkes Rolandedthttp://id.loc.gov/vocabulary/relators/edtLaskov Paveledthttp://id.loc.gov/vocabulary/relators/edtBOOK996465987703316Detection of Intrusions and Malware, and Vulnerability Assessment772293UNISA