top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings / / edited by Klaus Julisch, Christopher Kruegel
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005, Proceedings / / edited by Klaus Julisch, Christopher Kruegel
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (X, 241 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Operating systems (Computers)
Computers and civilization
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Operating Systems
Computers and Society
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Obfuscated Code Detection -- Analyzing Memory Accesses in Obfuscated x86 Executables -- Hybrid Engine for Polymorphic Shellcode Detection -- Honeypots -- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities -- A Pointillist Approach for Comparing Honeypots -- Vulnerability Assessment and Exploit Analysis -- Automatic Detection of Attacks on Cryptographic Protocols: A Case Study -- METAL – A Tool for Extracting Attack Manifestations -- Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone -- Anomaly Detection -- A Learning-Based Approach to the Detection of SQL Attacks -- Masquerade Detection via Customized Grammars -- A Prevention Model for Algorithmic Complexity Attacks -- Misuse Detection -- Detecting Malicious Code by Model Checking -- Improving the Efficiency of Misuse Detection -- Distributed Intrusion Detection and IDS Testing -- Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context -- TCPtransform: Property-Oriented TCP Traffic Transformation.
Record Nr. UNISA-996465823603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection [[electronic resource] ] : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings / / edited by Christopher Kruegel, Richard Lippmann, Andrew Clark
Recent Advances in Intrusion Detection [[electronic resource] ] : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings / / edited by Christopher Kruegel, Richard Lippmann, Andrew Clark
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XII, 340 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computer communication systems
Operating systems (Computers)
Cryptology
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Operating Systems
ISBN 3-540-74320-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Host-Based Intrusion Detection -- Exploiting Execution Context for the Detection of Anomalous System Calls -- Understanding Precision in Host Based Intrusion Detection -- Anomaly-Based Intrusion Detection -- Comparing Anomaly Detection Techniques for HTTP -- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications -- Network-Based Intrusion Detection and Response -- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode -- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware -- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks -- Insider Detection and Alert Correlation -- elicit: A System for Detecting Insiders Who Violate Need-to-Know -- On the Use of Different Statistical Tests for Alert Correlation – Short Paper -- Malicious Code Analysis -- Automated Classification and Analysis of Internet Malware -- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots -- A Forced Sampled Execution Approach to Kernel Rootkit Identification -- Evasion -- Advanced Allergy Attacks: Does a Corpus Really Help? -- Alert Verification Evasion Through Server Response Forging -- Malicious Code Defense -- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs -- SpyShield: Preserving Privacy from Spy Add-Ons -- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.
Record Nr. UNISA-996465522703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection [[electronic resource] ] : 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings / / edited by Diego Zamboni, Christopher Kruegel
Recent Advances in Intrusion Detection [[electronic resource] ] : 9th International Symposium, RAID 2006, Hamburg, Germany, September 20-22, 2006, Proceedings / / edited by Diego Zamboni, Christopher Kruegel
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XII, 331 p.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Management information systems
Computer science
Computers and civilization
Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Management of Computing and Information Systems
Computers and Society
Cryptology
Computer Communication Networks
Operating Systems
Soggetto non controllato Intrusion detection
RAID
ISBN 3-540-39725-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Recent Advances in Intrusion Detection -- A Framework for the Application of Association Rule Mining in Large Intrusion Detection Infrastructures -- Behavioral Distance Measurement Using Hidden Markov Models -- Automated Discovery of Mimicry Attacks -- Allergy Attack Against Automatic Signature Generation -- Paragraph: Thwarting Signature Learning by Training Maliciously -- Anomaly Detector Performance Evaluation Using a Parameterized Environment -- Ranking Attack Graphs -- Using Hidden Markov Models to Evaluate the Risks of Intrusions -- The Nepenthes Platform: An Efficient Approach to Collect Malware -- Automatic Handling of Protocol Dependencies and Reaction to 0-Day Attacks with ScriptGen Based Honeypots -- Fast and Evasive Attacks: Highlighting the Challenges Ahead -- Anagram: A Content Anomaly Detector Resistant to Mimicry Attack -- DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET -- Enhancing Network Intrusion Detection with Integrated Sampling and Filtering -- WIND: Workload-Aware INtrusion Detection -- SafeCard: A Gigabit IPS on the Network Card.
Record Nr. UNISA-996466072403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection [[electronic resource] ] : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Recent Advances in Intrusion Detection [[electronic resource] ] : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 242 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Management information systems
Computer science
Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management of Computing and Information Systems
Cryptology
Computer Communication Networks
Computer Science, general
Operating Systems
Computers and Society
ISBN 3-540-45248-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Record Nr. UNISA-996466061303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 242 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Management information systems
Computer science
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Computers and civilization
Management of Computing and Information Systems
Cryptology
Computer Communication Networks
Computer Science, general
Operating Systems
Computers and Society
ISBN 3-540-45248-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Record Nr. UNINA-9910144048203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui