LEADER 03141nam 2200637 450 001 9910484973703321 005 20220817155003.0 010 $a3-540-73614-X 024 7 $a10.1007/978-3-540-73614-1 035 $a(CKB)1000000000490500 035 $a(SSID)ssj0000317179 035 $a(PQKBManifestationID)11232418 035 $a(PQKBTitleCode)TC0000317179 035 $a(PQKBWorkID)10287276 035 $a(PQKB)11377836 035 $a(DE-He213)978-3-540-73614-1 035 $a(MiAaPQ)EBC3063224 035 $a(MiAaPQ)EBC6806149 035 $a(Au-PeEL)EBL6806149 035 $a(OCoLC)173853168 035 $a(PPN)123163730 035 $a(EXLCZ)991000000000490500 100 $a20220817d2007 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aDetection of intrusions and malware, and vulnerability assessment $e4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings /$fBernhard M. Ha?mmerli, Robin Sommer (editors) 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer-Verlag,$d[2007] 210 4$dİ2007 215 $a1 online resource (X, 254 p.) 225 1 $aLecture Notes in Computer Science ;$v4579 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-73613-1 320 $aIncludes bibliographical references and index. 327 $aWeb Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against ?JavaScript Malware? and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots? Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents. 410 0$aLecture notes in computer science ;$v4579. 606 $aComputers$xAccess control$vCongresses 606 $aComputers$xAccess control$xEvaluation$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 615 0$aComputers$xAccess control 615 0$aComputers$xAccess control$xEvaluation 615 0$aComputer networks$xSecurity measures 676 $a005.8 702 $aHa?mmerli$b Bernhard M. 702 $aSommer$b Robin 712 12$aDIMVA 2007 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484973703321 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$92071230 997 $aUNINA