top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Den Tätern auf der Spur [[electronic resource] ] : Spannende Fälle aus IT-Sicherheit und IT-Forensik / / von Alexander Dörsam
Den Tätern auf der Spur [[electronic resource] ] : Spannende Fälle aus IT-Sicherheit und IT-Forensik / / von Alexander Dörsam
Autore Dörsam Alexander
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 182 S. 7 Abb., 1 Abb. in Farbe.)
Disciplina 000
Soggetto topico Computer science
Computers
Law and legislation
Computer security
Application software
Popular Computer Science
Legal Aspects of Computing
Systems and Data Security
Information Systems Applications (incl. Internet)
ISBN 3-658-16466-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione ger
Record Nr. UNINA-9910484219703321
Dörsam Alexander  
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Data encryption (Computer science)
Software engineering
Law and legislation
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Cryptology
Software Engineering/Programming and Operating Systems
Legal Aspects of Computing
ISBN 3-030-52683-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.
Record Nr. UNISA-996418289503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers
Computer organization
Data encryption (Computer science)
Software engineering
Law and legislation
Systems and Data Security
Information Systems and Communication Service
Computer Systems Organization and Communication Networks
Cryptology
Software Engineering/Programming and Operating Systems
Legal Aspects of Computing
ISBN 3-030-52683-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.
Record Nr. UNINA-9910413445303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 405 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
ISBN 3-319-93411-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering.
Record Nr. UNINA-9910349434403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 405 p. 93 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
ISBN 3-319-93411-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering.
Record Nr. UNISA-996465795703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 412 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Application software
Data encryption (Computer science)
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-60876-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
Record Nr. UNISA-996466460303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 412 p. 114 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Operating systems (Computers)
Computers
Law and legislation
Computers and civilization
Application software
Data encryption (Computer science)
Systems and Data Security
Operating Systems
Legal Aspects of Computing
Computers and Society
Information Systems Applications (incl. Internet)
Cryptology
ISBN 3-319-60876-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
Record Nr. UNINA-9910484228403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Forensics and Cyber Crime [[electronic resource] ] : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings / / edited by Frank Breitinger, Ibrahim Baggili
Digital Forensics and Cyber Crime [[electronic resource] ] : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings / / edited by Frank Breitinger, Ibrahim Baggili
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 235 p. 317 illus., 31 illus. in color.)
Disciplina 363.25968
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Artificial intelligence
Data protection
Computers
Law and legislation
Software engineering
Artificial Intelligence
Security
Legal Aspects of Computing
Software Engineering/Programming and Operating Systems
ISBN 3-030-05487-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving -- fishy - A Framework for Implementing Filesystem-based Data Hiding Techniques -- If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept -- AndroParse - An Android Feature Extraction -- Digital Forensic Readiness Framework for Ransomware Investigation -- Forensics Analysis of an On-line Game over Steam Platform -- A Digital Forensic Investigation and Verification Model for Industria l Espionage -- Hard Drives and Digital Forensics -- Solid State Drive Forensics: Where Do We Stand? -- Associating Drives Based on Their Artifact and Metadata Distributions -- Digital Forensics Event Graph Reconstruction -- Multi-Item Passphrases: A Self-Adaptive Approach -- Against Offline Guessing Attacks -- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior.
Record Nr. UNINA-9910337854203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Forensics and Cyber Crime [[electronic resource] ] : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings / / edited by Petr Matoušek, Martin Schmiedecker
Digital Forensics and Cyber Crime [[electronic resource] ] : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings / / edited by Petr Matoušek, Martin Schmiedecker
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (X, 235 p. 83 illus.)
Disciplina 363.25968
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Computers
Law and legislation
Data protection
Computers and civilization
Management information systems
Computer science
Systems and Data Security
Legal Aspects of Computing
Security
Computers and Society
Management of Computing and Information Systems
ISBN 3-319-73697-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud -- Real-time Forensics through Endpoint Visibility -- Locky ransomware, Al Capone and Brexit Deanonymization -- Finding and Rating Personal Names on Drives for Forensic Needs -- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness -- Open Source Forensics for a Multi-platform Drone System -- A Novel File Carving Algorithm for EVTX Logs -- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence -- Cyber Crime Investigation and Digital Forensics Triage -- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector -- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph --  Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees -- Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics -- Memory Forensics and the Macintosh OS X Operating System -- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation -- An Overview of the Usage of Default Passwords Hacking -- Automation of MitM Attack on Wi-Fi Networks -- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle -- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets.
Record Nr. UNINA-9910299293703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital Forensics and Cyber Crime [[electronic resource] ] : Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers / / edited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili
Digital Forensics and Cyber Crime [[electronic resource] ] : Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers / / edited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVI, 253 p. 68 illus.)
Disciplina 005.8
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Computers
Law and legislation
E-commerce
Computers and civilization
Data structures (Computer science)
Management information systems
Computer science
Systems and Data Security
Legal Aspects of Computing
e-Commerce/e-business
Computers and Society
Data Structures and Information Theory
Management of Computing and Information Systems
ISBN 3-319-14289-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Digital Forensics – Technical -- Information Warfare, Cyber Terrorism and Critical Infrastructure Protection -- Digital Forensics - Standards, Certification and Accreditation -- Automation in Digital Forensics.
Record Nr. UNINA-9910298992303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui