top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Mobile agents and security / / Giovanni Vigna, editor
Mobile agents and security / / Giovanni Vigna, editor
Edizione [1st ed. 1998.]
Pubbl/distr/stampa New York : , : Springer, , [1998]
Descrizione fisica 1 online resource (XII, 257 p. 8 illus.)
Disciplina 006.3
Collana Lecture notes in computer science
Soggetto topico Mobile agents (Computer software)
Computer security
ISBN 3-540-68671-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations -- Security Issues in Mobile Code Systems -- Environmental Key Generation Towards Clueless Agents -- Language Issues in Mobile Program Security -- Protecting Mobile Agents Against Malicious Hosts -- Security Mechanisms -- Safe, Untrusted Agents Using Proof-Carrying Code -- Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts -- Authentication for Mobile Agents -- Cryptographic Traces for Mobile Agents -- Mobile Code Systems -- D’Agents: Security in a Multiple-Language, Mobile-Agent System -- A Security Model for Aglets -- Signing, Sealing, and Guarding Java™ Objects -- Active Content and Security -- The Safe-Tcl Security Model -- Web Browsers and Security.
Record Nr. UNISA-996466137503316
New York : , : Springer, , [1998]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Mobile agents and security / / Giovanni Vigna, editor
Mobile agents and security / / Giovanni Vigna, editor
Edizione [1st ed. 1998.]
Pubbl/distr/stampa New York : , : Springer, , [1998]
Descrizione fisica 1 online resource (XII, 257 p. 8 illus.)
Disciplina 006.3
Collana Lecture notes in computer science
Soggetto topico Mobile agents (Computer software)
Computer security
ISBN 3-540-68671-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foundations -- Security Issues in Mobile Code Systems -- Environmental Key Generation Towards Clueless Agents -- Language Issues in Mobile Program Security -- Protecting Mobile Agents Against Malicious Hosts -- Security Mechanisms -- Safe, Untrusted Agents Using Proof-Carrying Code -- Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts -- Authentication for Mobile Agents -- Cryptographic Traces for Mobile Agents -- Mobile Code Systems -- D’Agents: Security in a Multiple-Language, Mobile-Agent System -- A Security Model for Aglets -- Signing, Sealing, and Guarding Java™ Objects -- Active Content and Security -- The Safe-Tcl Security Model -- Web Browsers and Security.
Record Nr. UNINA-9910143631603321
New York : , : Springer, , [1998]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection [[electronic resource] ] : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Recent Advances in Intrusion Detection [[electronic resource] ] : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 242 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Management information systems
Computer science
Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Computers and civilization
Management of Computing and Information Systems
Cryptology
Computer Communication Networks
Computer Science, general
Operating Systems
Computers and Society
ISBN 3-540-45248-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Record Nr. UNISA-996466061303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Recent Advances in Intrusion Detection : 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings / / edited by Giovanni Vigna, Erland Jonsson, Christopher Kruegel
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 242 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Management information systems
Computer science
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Computers and civilization
Management of Computing and Information Systems
Cryptology
Computer Communication Networks
Computer Science, general
Operating Systems
Computers and Society
ISBN 3-540-45248-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Infrastructure -- Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller -- Topology-Based Detection of Anomalous BGP Messages -- Anomaly Detection I -- Detecting Anomalous Network Traffic with Self-organizing Maps -- An Approach for Detecting Self-propagating Email Using Anomaly Detection -- Correlation -- Statistical Causality Analysis of INFOSEC Alert Data -- Correlation of Intrusion Symptoms: An Application of Chronicles -- Modeling and Specification -- Modeling Computer Attacks: An Ontology for Intrusion Detection -- Using Specification-Based Intrusion Detection for Automated Response -- IDS Sensors -- Characterizing the Performance of Network Intrusion Detection Sensors -- Using Decision Trees to Improve Signature-Based Intrusion Detection -- Ambiguity Resolution via Passive OS Fingerprinting -- Anomaly Detection II -- Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems -- An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection.
Record Nr. UNINA-9910144048203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection [[electronic resource] ] : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Recent Advances in Intrusion Detection [[electronic resource] ] : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (X, 327 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico System safety
Computer science
Computer communication systems
Operating systems (Computers)
Data encryption (Computer science)
Computers and civilization
Security Science and Technology
Computer Science, general
Computer Communication Networks
Operating Systems
Cryptology
Computers and Society
ISBN 3-540-36084-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stepping Stone Detection -- Detecting Long Connection Chains of Interactive Terminal Sessions -- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay -- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses -- Anomaly Detection -- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits -- Correlation -- Analyzing Intensive Intrusion Alerts via Correlation -- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation -- M2D2: A Formal Data Model for IDS Alert Correlation -- Legal Aspects / Intrusion Tolerance -- Development of a Legal Framework for Intrusion Detection -- Learning Unknown Attacks — A Start -- Assessment of Intrusion Detection Systems -- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems -- A Stochastic Model for Intrusions -- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool -- Capacity Verification for High Speed Network Intrusion Detection Systems -- Adaptive Intrusion Detection Systems -- Performance Adaptation in Real-Time Intrusion Detection Systems -- Intrusion Detection Analysis -- Accurate Buffer Overflow Detection via Abstract Pay load Execution -- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level -- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.
Record Nr. UNISA-996465560003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Recent Advances in Intrusion Detection : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Recent Advances in Intrusion Detection : 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings / / edited by Andreas Wespi, Giovanni Vigna, Luca Deri
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (X, 327 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico System safety
Computer science
Computer networks
Operating systems (Computers)
Data encryption (Computer science)
Computers and civilization
Security Science and Technology
Computer Science, general
Computer Communication Networks
Operating Systems
Cryptology
Computers and Society
ISBN 3-540-36084-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stepping Stone Detection -- Detecting Long Connection Chains of Interactive Terminal Sessions -- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay -- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses -- Anomaly Detection -- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits -- Correlation -- Analyzing Intensive Intrusion Alerts via Correlation -- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation -- M2D2: A Formal Data Model for IDS Alert Correlation -- Legal Aspects / Intrusion Tolerance -- Development of a Legal Framework for Intrusion Detection -- Learning Unknown Attacks — A Start -- Assessment of Intrusion Detection Systems -- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems -- A Stochastic Model for Intrusions -- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool -- Capacity Verification for High Speed Network Intrusion Detection Systems -- Adaptive Intrusion Detection Systems -- Performance Adaptation in Real-Time Intrusion Detection Systems -- Intrusion Detection Analysis -- Accurate Buffer Overflow Detection via Abstract Pay load Execution -- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level -- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.
Record Nr. UNINA-9910143895503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui