LEADER 04123nam 22008055 450 001 996466271403316 005 20200701234204.0 010 $a3-319-45719-5 024 7 $a10.1007/978-3-319-45719-2 035 $a(CKB)3710000000872912 035 $a(DE-He213)978-3-319-45719-2 035 $a(MiAaPQ)EBC6296721 035 $a(MiAaPQ)EBC5576875 035 $a(Au-PeEL)EBL5576875 035 $a(OCoLC)958630890 035 $a(PPN)195510836 035 $a(EXLCZ)993710000000872912 100 $a20160906d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aResearch in Attacks, Intrusions, and Defenses$b[electronic resource] $e19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings /$fedited by Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquin Garcia-Alfaro 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIII, 482 p. 126 illus.) 225 1 $aSecurity and Cryptology ;$v9854 311 $a3-319-45718-7 327 $aSystems security -- Low-level attacks and defenses -- Measurement studies.-Malware analysis -- Network security -- Systematization of knowledge and experience reports -- Web and mobile security. 330 $aThis book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016. The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security. 410 0$aSecurity and Cryptology ;$v9854 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputer communication systems 606 $aApplication software 606 $aSoftware engineering 606 $aAlgorithms 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aAlgorithms. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aSoftware Engineering. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.7 702 $aMonrose$b Fabian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDacier$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBlanc$b Gregory$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466271403316 996 $aResearch in Attacks, Intrusions, and Defenses$91912512 997 $aUNISA