03993nam 22007335 450 99646598770331620200706155914.03-540-36017-410.1007/11790754(CKB)1000000000283809(SSID)ssj0000317178(PQKBManifestationID)11232417(PQKBTitleCode)TC0000317178(PQKBWorkID)10287193(PQKB)10112798(DE-He213)978-3-540-36017-9(MiAaPQ)EBC3068119(PPN)123136555(EXLCZ)99100000000028380920100301d2006 u| 0engurnn|008mamaatxtccrDetection of Intrusions and Malware, and Vulnerability Assessment[electronic resource] Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings /edited by Roland Büschkes, Pavel Laskov1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (X, 195 p.) Security and Cryptology ;4064Bibliographic Level Mode of Issuance: Monograph3-540-36014-X Includes bibliographical references and index.Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network–Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.Security and Cryptology ;4064Data encryption (Computer science)Management information systemsComputer scienceComputer communication systemsOperating systems (Computers)Computers and civilizationCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Data encryption (Computer science).Management information systems.Computer science.Computer communication systems.Operating systems (Computers).Computers and civilization.Cryptology.Management of Computing and Information Systems.Computer Communication Networks.Operating Systems.Computers and Society.005.8Büschkes Rolandedthttp://id.loc.gov/vocabulary/relators/edtLaskov Paveledthttp://id.loc.gov/vocabulary/relators/edtBOOK996465987703316Detection of Intrusions and Malware, and Vulnerability Assessment772293UNISA00993nam a2200241 i 4500991001264059707536110613s19580000it lat b13987082-39ule_instBiblioteca Interfacoltàita873091.09377Rabirius, Gaius190281Bellum actiacum e papyro Herculanensi 817 /Rabirius Caius ; edidit Ioannes GarutiBologna :Zanichelli,1958XXXVIII, 104 p. ;21 cm.Studi pubblicati dall'Istituto di filologia classica dell'Università di Bologna ;5Garuti, Giovanni<1920-2004> .b1398708202-04-1413-06-11991001264059707536LE002 Museo Papirologico BELT 091.09377 RAB12002000624185le002gE10.00-no 00000.i1528189913-06-11Bellum actiacum e papyro Herculanensi 817247615UNISALENTOle00213-06-11ma -latit 00