LEADER 03861nam 22006975 450 001 996465790603316 005 20200706154603.0 010 $a3-319-40667-1 024 7 $a10.1007/978-3-319-40667-1 035 $a(CKB)3710000000735257 035 $a(DE-He213)978-3-319-40667-1 035 $a(MiAaPQ)EBC6301842 035 $a(MiAaPQ)EBC5587448 035 $a(Au-PeEL)EBL5587448 035 $a(OCoLC)952407839 035 $a(PPN)194378551 035 $a(EXLCZ)993710000000735257 100 $a20160611d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment$b[electronic resource] $e13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings /$fedited by Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 442 p. 103 illus.) 225 1 $aSecurity and Cryptology ;$v9721 311 $a3-319-40666-3 327 $aIntrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques, and application -- Computer security -- Vulnerability detection -- Attack prevention -- Web security -- Malware detection and classification -- Authentication -- Data leakage prevention -- Countering evasive techniques such as obfuscation. 330 $aThis book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation. . 410 0$aSecurity and Cryptology ;$v9721 606 $aComputer security 606 $aData encryption (Computer science) 606 $aE-commerce 606 $aManagement information systems 606 $aComputer science 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aE-commerce. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$ae-Commerce/e-business. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aCaballero$b Juan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZurutuza$b Urko$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRodríguez$b Ricardo J$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465790603316 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$92071230 997 $aUNISA