LEADER 03490nam 22007215 450 001 996202529103316 005 20200701163226.0 010 $a3-319-11379-8 024 7 $a10.1007/978-3-319-11379-1 035 $a(CKB)3710000000227403 035 $a(SSID)ssj0001338840 035 $a(PQKBManifestationID)11704413 035 $a(PQKBTitleCode)TC0001338840 035 $a(PQKBWorkID)11345464 035 $a(PQKB)10661467 035 $a(DE-He213)978-3-319-11379-1 035 $a(MiAaPQ)EBC6301208 035 $a(MiAaPQ)EBC5579436 035 $a(Au-PeEL)EBL5579436 035 $a(OCoLC)889880814 035 $a(PPN)180626566 035 $a(EXLCZ)993710000000227403 100 $a20140820d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aResearch in Attacks, Intrusions and Defenses$b[electronic resource] $e17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings /$fedited by Angelos Stavrou, Herbert Bos, Georgios Portokalidis 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XIV, 490 p. 114 illus.) 225 1 $aSecurity and Cryptology ;$v8688 300 $aIncludes index. 311 $a3-319-11378-X 327 $aComputer security.- Network security -- Authentication -- Malware -- Intrusion detection -- Browser security -- Web application security -- Wireless security -- Vulnerability analysis. 330 $aThis book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis. 410 0$aSecurity and Cryptology ;$v8688 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a353.00722 702 $aStavrou$b Angelos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBos$b Herbert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPortokalidis$b Georgios$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996202529103316 996 $aResearch in Attacks, Intrusions, and Defenses$91912512 997 $aUNISA