Den Tätern auf der Spur [[electronic resource] ] : Spannende Fälle aus IT-Sicherheit und IT-Forensik / / von Alexander Dörsam |
Autore | Dörsam Alexander |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 182 S. 7 Abb., 1 Abb. in Farbe.) |
Disciplina | 000 |
Soggetto topico |
Computer science
Computers Law and legislation Computer security Application software Popular Computer Science Legal Aspects of Computing Systems and Data Security Information Systems Applications (incl. Internet) |
ISBN | 3-658-16466-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-9910484219703321 |
Dörsam Alexander | ||
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Computer organization Data encryption (Computer science) Software engineering Law and legislation Systems and Data Security Information Systems and Communication Service Computer Systems Organization and Communication Networks Cryptology Software Engineering/Programming and Operating Systems Legal Aspects of Computing |
ISBN | 3-030-52683-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor. |
Record Nr. | UNISA-996418289503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Computer organization Data encryption (Computer science) Software engineering Law and legislation Systems and Data Security Information Systems and Communication Service Computer Systems Organization and Communication Networks Cryptology Software Engineering/Programming and Operating Systems Legal Aspects of Computing |
ISBN | 3-030-52683-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor. |
Record Nr. | UNINA-9910413445303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 405 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society |
ISBN | 3-319-93411-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering. |
Record Nr. | UNINA-9910349434403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 405 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society |
ISBN | 3-319-93411-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering. |
Record Nr. | UNISA-996465795703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 412 p. 114 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Application software Data encryption (Computer science) Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-60876-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security. |
Record Nr. | UNISA-996466460303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / / edited by Michalis Polychronakis, Michael Meier |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 412 p. 114 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Application software Data encryption (Computer science) Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-60876-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security. |
Record Nr. | UNINA-9910484228403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Forensics and Cyber Crime [[electronic resource] ] : 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings / / edited by Frank Breitinger, Ibrahim Baggili |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 235 p. 317 illus., 31 illus. in color.) |
Disciplina | 363.25968 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Artificial intelligence
Data protection Computers Law and legislation Software engineering Artificial Intelligence Security Legal Aspects of Computing Software Engineering/Programming and Operating Systems |
ISBN | 3-030-05487-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On Efficiency and Effectiveness of Linear Function Detection Approaches for Memory Carving -- fishy - A Framework for Implementing Filesystem-based Data Hiding Techniques -- If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept -- AndroParse - An Android Feature Extraction -- Digital Forensic Readiness Framework for Ransomware Investigation -- Forensics Analysis of an On-line Game over Steam Platform -- A Digital Forensic Investigation and Verification Model for Industria l Espionage -- Hard Drives and Digital Forensics -- Solid State Drive Forensics: Where Do We Stand? -- Associating Drives Based on Their Artifact and Metadata Distributions -- Digital Forensics Event Graph Reconstruction -- Multi-Item Passphrases: A Self-Adaptive Approach -- Against Offline Guessing Attacks -- Hybrid Intrusion Detection System for Worm Attacks Based on Their Network Behavior. |
Record Nr. | UNINA-9910337854203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Forensics and Cyber Crime [[electronic resource] ] : 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings / / edited by Petr Matoušek, Martin Schmiedecker |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (X, 235 p. 83 illus.) |
Disciplina | 363.25968 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer security
Computers Law and legislation Data protection Computers and civilization Management information systems Computer science Systems and Data Security Legal Aspects of Computing Security Computers and Society Management of Computing and Information Systems |
ISBN | 3-319-73697-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | FindEvasion : An Effective Environment-sensitive Malware Detection System for the Cloud -- Real-time Forensics through Endpoint Visibility -- Locky ransomware, Al Capone and Brexit Deanonymization -- Finding and Rating Personal Names on Drives for Forensic Needs -- A Web-Based Mouse Dynamics Visualization Tool for User Attribution in Digital Forensic Readiness -- Open Source Forensics for a Multi-platform Drone System -- A Novel File Carving Algorithm for EVTX Logs -- Fuzzy System-based Suspicious Pattern Detection in Mobile Forensic Evidence -- Cyber Crime Investigation and Digital Forensics Triage -- Digital Forensic Readiness in Critical Infrastructures: A case of substation automation in the power sector -- A Visualization Scheme for Network Forensics based on Attribute Oriented Induction based Frequent Item Mining and Hyper Graph -- Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees -- Approxis: a fast, robust, lightweight and approximate Disassembler considered in the field of memory forensics -- Memory Forensics and the Macintosh OS X Operating System -- Sketch-based Modeling and Immersive Display Techniques for Indoor Crime Scene Presentation -- An Overview of the Usage of Default Passwords Hacking -- Automation of MitM Attack on Wi-Fi Networks -- SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle -- Coriander: A Toolset for Generating Realistic Android Digital Evidence Datasets. |
Record Nr. | UNINA-9910299293703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital Forensics and Cyber Crime [[electronic resource] ] : Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers / / edited by Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVI, 253 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer security
Computers Law and legislation E-commerce Computers and civilization Data structures (Computer science) Management information systems Computer science Systems and Data Security Legal Aspects of Computing e-Commerce/e-business Computers and Society Data Structures and Information Theory Management of Computing and Information Systems |
ISBN | 3-319-14289-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Digital Forensics – Technical -- Information Warfare, Cyber Terrorism and Critical Infrastructure Protection -- Digital Forensics - Standards, Certification and Accreditation -- Automation in Digital Forensics. |
Record Nr. | UNINA-9910298992303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|