Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings / / edited by Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 442 p. 103 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) E-commerce Management information systems Computer science Systems and Data Security Cryptology e-Commerce/e-business Management of Computing and Information Systems |
ISBN | 3-319-40667-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques, and application -- Computer security -- Vulnerability detection -- Attack prevention -- Web security -- Malware detection and classification -- Authentication -- Data leakage prevention -- Countering evasive techniques such as obfuscation. |
Record Nr. | UNISA-996465790603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment : 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings / / edited by Juan Caballero, Urko Zurutuza, Ricardo J. Rodríguez |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XIV, 442 p. 103 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) E-commerce Management information systems Computer science Systems and Data Security Cryptology e-Commerce/e-business Management of Computing and Information Systems |
ISBN | 3-319-40667-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion detection -- Malware analysis -- Vulnerability assessment -- Novel ideas, techniques, and application -- Computer security -- Vulnerability detection -- Attack prevention -- Web security -- Malware detection and classification -- Authentication -- Data leakage prevention -- Countering evasive techniques such as obfuscation. |
Record Nr. | UNINA-9910484598303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings / / edited by Juan Caballero, Eric Bodden, Elias Athanasopoulos |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 269 p. 64 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-30806-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Testing beyond Functional Tests -- Progress-Sensitive Security for SPARK -- Sound and Precise Cross-Layer Data Flow Tracking -- Automatically Extracting Threats from Extended Data Flow Diagrams -- On the Static Analysis of Hybrid Mobile Apps -- Semantics-based Repackaging Detection for Mobile Apps -- Accelerometer-based Device Fingerprinting for Multi-factor Mobile Authentication -- POODLEs, More POODLEs, FREAK Attacks too: How Server Administrators Responded to Three Serious Web Vulnerabilities -- PADS: a platform to detect stealth attacks -- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a Proprietary Product -- Idea: Usable Platforms for Secure Programming { Mining Unix for Insight and Guidelines -- AppPAL for Android: Capturing and Checking Mobile App Policies -- Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language -- Idea: Supporting Policy-Based Access Control on Database Systems -- Idea: Enforcing Security Properties by Solving Behavioural Equations. |
Record Nr. | UNISA-996466004703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings / / edited by Juan Caballero, Eric Bodden, Elias Athanasopoulos |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 269 p. 64 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-30806-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Testing beyond Functional Tests -- Progress-Sensitive Security for SPARK -- Sound and Precise Cross-Layer Data Flow Tracking -- Automatically Extracting Threats from Extended Data Flow Diagrams -- On the Static Analysis of Hybrid Mobile Apps -- Semantics-based Repackaging Detection for Mobile Apps -- Accelerometer-based Device Fingerprinting for Multi-factor Mobile Authentication -- POODLEs, More POODLEs, FREAK Attacks too: How Server Administrators Responded to Three Serious Web Vulnerabilities -- PADS: a platform to detect stealth attacks -- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a Proprietary Product -- Idea: Usable Platforms for Secure Programming { Mining Unix for Insight and Guidelines -- AppPAL for Android: Capturing and Checking Mobile App Policies -- Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language -- Idea: Supporting Policy-Based Access Control on Database Systems -- Idea: Enforcing Security Properties by Solving Behavioural Equations. |
Record Nr. | UNINA-9910483373703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings / / edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 227 p. 63 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-15618-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal methods -- Cloud passwords -- Machine learning -- Measurements ontologies -- Access control. |
Record Nr. | UNISA-996198743803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings / / edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 227 p. 63 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-15618-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal methods -- Cloud passwords -- Machine learning -- Measurements ontologies -- Access control. |
Record Nr. | UNINA-9910484540603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|