top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Recent Advances in Intrusion Detection [[electronic resource] ] : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Recent Advances in Intrusion Detection [[electronic resource] ] : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (X, 327 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico System safety
Computer science
Computer communication systems
Operating systems (Computers)
Data encryption (Computer science)
Computers and civilization
Security Science and Technology
Computer Science, general
Computer Communication Networks
Operating Systems
Cryptology
Computers and Society
ISBN 3-540-36084-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stepping Stone Detection -- Detecting Long Connection Chains of Interactive Terminal Sessions -- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay -- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses -- Anomaly Detection -- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits -- Correlation -- Analyzing Intensive Intrusion Alerts via Correlation -- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation -- M2D2: A Formal Data Model for IDS Alert Correlation -- Legal Aspects / Intrusion Tolerance -- Development of a Legal Framework for Intrusion Detection -- Learning Unknown Attacks — A Start -- Assessment of Intrusion Detection Systems -- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems -- A Stochastic Model for Intrusions -- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool -- Capacity Verification for High Speed Network Intrusion Detection Systems -- Adaptive Intrusion Detection Systems -- Performance Adaptation in Real-Time Intrusion Detection Systems -- Intrusion Detection Analysis -- Accurate Buffer Overflow Detection via Abstract Pay load Execution -- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level -- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.
Record Nr. UNISA-996465560003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Recent Advances in Intrusion Detection : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (X, 327 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico System safety
Computer science
Computer networks
Operating systems (Computers)
Data encryption (Computer science)
Computers and civilization
Security Science and Technology
Computer Science, general
Computer Communication Networks
Operating Systems
Cryptology
Computers and Society
ISBN 3-540-36084-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stepping Stone Detection -- Detecting Long Connection Chains of Interactive Terminal Sessions -- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay -- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses -- Anomaly Detection -- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits -- Correlation -- Analyzing Intensive Intrusion Alerts via Correlation -- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation -- M2D2: A Formal Data Model for IDS Alert Correlation -- Legal Aspects / Intrusion Tolerance -- Development of a Legal Framework for Intrusion Detection -- Learning Unknown Attacks — A Start -- Assessment of Intrusion Detection Systems -- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems -- A Stochastic Model for Intrusions -- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool -- Capacity Verification for High Speed Network Intrusion Detection Systems -- Adaptive Intrusion Detection Systems -- Performance Adaptation in Real-Time Intrusion Detection Systems -- Intrusion Detection Analysis -- Accurate Buffer Overflow Detection via Abstract Pay load Execution -- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level -- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.
Record Nr. UNINA-9910143895503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui