LEADER 03233nam 2200649 a 450 001 9910483354803321 005 20200520144314.0 010 $a3-540-36017-4 024 7 $a10.1007/11790754 035 $a(CKB)1000000000283809 035 $a(SSID)ssj0000317178 035 $a(PQKBManifestationID)11232417 035 $a(PQKBTitleCode)TC0000317178 035 $a(PQKBWorkID)10287193 035 $a(PQKB)10112798 035 $a(DE-He213)978-3-540-36017-9 035 $a(MiAaPQ)EBC3068119 035 $a(PPN)123136555 035 $a(EXLCZ)991000000000283809 100 $a20060531d2006 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of intrusions and malware & vulnerability assessment $ethird international conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006 : proceedings /$fRoland Buschkes, Pavel Laskov (eds.) 205 $a1st ed. 2006. 210 $aBerlin $cSpringer$d2006 215 $a1 online resource (X, 195 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v4064 225 1 $aLNCS sublibrary. SL 4, Security and cryptology 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-36014-X 320 $aIncludes bibliographical references and index. 327 $aCode Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network?Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. 410 0$aLecture notes in computer science ;$v4064. 410 0$aLNCS sublibrary.$nSL 4,$pSecurity and cryptology. 517 3 $aDetection of intrusions and malware and vulnerability assessment 517 3 $aDIMVA 2006 606 $aComputers$xAccess control$vCongresses 606 $aComputers$xAccess control$xEvaluation$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer security$vCongresses 615 0$aComputers$xAccess control 615 0$aComputers$xAccess control$xEvaluation 615 0$aComputer networks$xSecurity measures 615 0$aComputer security 676 $a005.8 701 $aBuschkes$b Roland$01751702 701 $aLaskov$b Pavel$01751703 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483354803321 996 $aDetection of intrusions and malware & vulnerability assessment$94186785 997 $aUNINA