top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 243 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Computer communication systems
Architecture, Computer
Systems and Data Security
e-Commerce/e-business
Computer Communication Networks
Computer System Implementation
ISBN 3-642-37300-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis.
Record Nr. UNISA-996465575003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Detection of Intrusions and Malware, and Vulnerability Assessment : 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers / / edited by Ulrich Flegel, Evangelos Markatos, William Robertson
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 243 p. 86 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Computer communication systems
Architecture, Computer
Systems and Data Security
e-Commerce/e-business
Computer Communication Networks
Computer System Implementation
ISBN 3-642-37300-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Using File Relationships in Malware -- Understanding DMA Malware -- Large-Scale Analysis of Malware Downloaders -- Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications -- ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems -- A Static, Packer-Agnostic Filter to Detect Similar Malware Samples -- Experiments with Malware Visualization -- Tracking Memory Writes for Malware Classification and Code Reuse Identification -- System-Level Support for Intrusion Recovery -- NetGator: Malware Detection Using Program Interactive Challenges -- SmartProxy: Secure Smartphone-Assisted Loginon Compromised Machines -- BISSAM: Automatic Vulnerability Identification of Office Documents -- Self-organized Collaboration of Distributed IDS Sensors -- Shedding Light on Log Correlation in Network Forensics Analysis.
Record Nr. UNINA-9910741165403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 225 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Computer security
Computers and civilization
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Systems and Data Security
Computers and Society
Soggetto genere / forma Como (2009)
Kongress.
ISBN 3-642-02918-3
Classificazione DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection.
Record Nr. UNISA-996465430203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 225 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Computer security
Computers and civilization
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Systems and Data Security
Computers and Society
Soggetto genere / forma Como (2009)
Kongress.
ISBN 3-642-02918-3
Classificazione DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection.
Record Nr. UNINA-9910484356103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui