LEADER 03690nam 22007575 450 001 9910484228403321 005 20200702234914.0 010 $a3-319-60876-2 024 7 $a10.1007/978-3-319-60876-1 035 $a(CKB)4340000000061587 035 $a(DE-He213)978-3-319-60876-1 035 $a(MiAaPQ)EBC5576966 035 $a(PPN)202990974 035 $a(EXLCZ)994340000000061587 100 $a20170603d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment $e14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings /$fedited by Michalis Polychronakis, Michael Meier 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (X, 412 p. 114 illus.) 225 1 $aSecurity and Cryptology ;$v10327 311 $a3-319-60875-4 320 $aIncludes bibliographical references and index. 327 $aEnclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security. 330 $a This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security. 410 0$aSecurity and Cryptology ;$v10327 606 $aComputer security 606 $aOperating systems (Computers) 606 $aComputers 606 $aLaw and legislation 606 $aComputers and civilization 606 $aApplication software 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aOperating systems (Computers). 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aComputers and civilization. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aOperating Systems. 615 24$aLegal Aspects of Computing. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 676 $a005.8 702 $aPolychronakis$b Michalis$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeier$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484228403321 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$93395207 997 $aUNINA