LEADER 04619nam 22007455 450 001 996466107403316 005 20200629171452.0 010 $a3-540-70542-2 024 7 $a10.1007/978-3-540-70542-0 035 $a(CKB)1000000000490499 035 $a(SSID)ssj0000317180 035 $a(PQKBManifestationID)11231536 035 $a(PQKBTitleCode)TC0000317180 035 $a(PQKBWorkID)10288920 035 $a(PQKB)10728206 035 $a(DE-He213)978-3-540-70542-0 035 $a(MiAaPQ)EBC3068567 035 $a(PPN)127054901 035 $a(EXLCZ)991000000000490499 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDetection of Intrusions and Malware, and Vulnerability Assessment$b[electronic resource] $e5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings /$fedited by Diego Zamboni 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (X, 279 p.) 225 1 $aSecurity and Cryptology ;$v5137 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-70541-4 320 $aIncludes bibliographical references and index. 327 $aAttack Prevention -- Data Space Randomization -- XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks -- VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges -- Malware Detection and Prevention (I) -- Dynamic Binary Instrumentation-Based Framework for Malware Defense -- Embedded Malware Detection Using Markov n-Grams -- Learning and Classification of Malware Behavior -- Attack Techniques and Vulnerability Assessment -- On Race Vulnerabilities in Web Applications -- On the Limits of Information Flow Techniques for Malware Analysis and Containment -- Malware Detection and Prevention (II) -- Expanding Malware Defense by Securing Software Installations -- FluXOR: Detecting and Monitoring Fast-Flux Service Networks -- Traffic Aggregation for Malware Detection -- Intrusion Detection and Activity Correlation -- The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors -- The Quest for Multi-headed Worms -- A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2008, held in Paris, France in July 2008. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on attack prevention, malware detection and prevention, attack techniques and vulnerability assessment, and intrusion detection and activity correlation. 410 0$aSecurity and Cryptology ;$v5137 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aComputer security 606 $aComputers and civilization 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aComputers and Society. 676 $a005.8 702 $aZamboni$b Diego$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aDIMVA 2008 906 $aBOOK 912 $a996466107403316 996 $aDetection of Intrusions and Malware, and Vulnerability Assessment$9772293 997 $aUNISA LEADER 00974nam0-2200289 --450 001 9910633293503321 005 20221221093946.0 010 $a88-87017-43-3 100 $a20221221d2005----kmuy0itay5050 ba 101 2 $aita$aeng 102 $aIT 105 $a 001yy 200 1 $aLenci Valentin$earchitettura teorematica = theorematic architecture$earchitetture 1978-2005 = architectural works 1978-2005$fRuggero Lenci, Nilda Valentin$gintroduzioni/introductions: Mario Antonio Arnaboldi ... [et. al.] 210 $aRoma$cMancosu$d[2005] 215 $a287 p.$cill.$d24 cm 300 $aTesto anche in inglese 610 0 $aArchitettura 700 1$aLenci,$bRuggero$010961 701 1$aValentin,$bNilda$0515187 702 1$aArnaboldi,$bMario Antonio 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910633293503321 952 $aFONDO ROSSI 2456$bROSSI 2537$fFARBC 959 $aFARBC 996 $aLenci Valentin$92986004 997 $aUNINA