top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings / / edited by Klaus Julisch, Christopher Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings / / edited by Klaus Julisch, Christopher Kruegel
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 241 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Operating systems (Computers)
Computers and civilization
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Operating Systems
Computers and Society
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Obfuscated Code Detection -- Analyzing Memory Accesses in Obfuscated x86 Executables -- Hybrid Engine for Polymorphic Shellcode Detection -- Honeypots -- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing Honeypots -- Vulnerability Assessment and Exploit Analysis -- Automatic Detection of Attacks on Cryptographic Protocols: A Case Study -- METAL – A Tool for Extracting Attack Manifestations -- Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone -- Anomaly Detection -- A Learning-Based Approach to the Detection of SQL Attacks -- Masquerade Detection via Customized Grammars -- A Prevention Model for Algorithmic Complexity Attacks -- Misuse Detection -- Detecting Malicious Code by Model Checking -- Improving the Efficiency of Misuse Detection -- Distributed Intrusion Detection and IDS Testing -- Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context -- TCPtransform: Property-Oriented TCP Traffic Transformation.
Record Nr. UNISA-996465823603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of intrusions and malware, and vulnerability assessment : second international conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings / / Klaus Julisch, Christopher Kruegel (eds.)
Detection of intrusions and malware, and vulnerability assessment : second international conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings / / Klaus Julisch, Christopher Kruegel (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2005
Descrizione fisica 1 online resource (X, 241 p.)
Disciplina 005.8
Altri autori (Persone) JulischKlaus
KruegelChristopher <1976->
Collana Lecture notes in computer science
Soggetto topico Computer security
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Obfuscated Code Detection -- Analyzing Memory Accesses in Obfuscated x86 Executables -- Hybrid Engine for Polymorphic Shellcode Detection -- Honeypots -- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing Honeypots -- Vulnerability Assessment and Exploit Analysis -- Automatic Detection of Attacks on Cryptographic Protocols: A Case Study -- METAL – A Tool for Extracting Attack Manifestations -- Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone -- Anomaly Detection -- A Learning-Based Approach to the Detection of SQL Attacks -- Masquerade Detection via Customized Grammars -- A Prevention Model for Algorithmic Complexity Attacks -- Misuse Detection -- Detecting Malicious Code by Model Checking -- Improving the Efficiency of Misuse Detection -- Distributed Intrusion Detection and IDS Testing -- Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context -- TCPtransform: Property-Oriented TCP Traffic Transformation.
Altri titoli varianti DIMVA 2005
Record Nr. UNINA-9910484247803321
Berlin ; ; New York, : Springer, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui