24th International Symposium on Research in Attacks, Intrusions and Defenses / / Association for Computing Machinery
| 24th International Symposium on Research in Attacks, Intrusions and Defenses / / Association for Computing Machinery |
| Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2021 |
| Descrizione fisica | 1 online resource (468 pages) : illustrations |
| Disciplina | 005.83 |
| Collana | ACM Other conferences |
| Soggetto topico | Intrusion detection systems (Computer security) |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910574884003321 |
| New York : , : Association for Computing Machinery, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Detection of intrusions and malware, and vulnerability assessment : 18th International Conference, DIMVA 2021, Virtual event, July 14-16, 2021, proceedings / / Leyla Bilge [and three others] (editors)
| Detection of intrusions and malware, and vulnerability assessment : 18th International Conference, DIMVA 2021, Virtual event, July 14-16, 2021, proceedings / / Leyla Bilge [and three others] (editors) |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (403 pages) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Intrusion detection systems (Computer security)
Computer security |
| ISBN | 3-030-80825-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464405203316 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Detection of intrusions and malware, and vulnerability assessment : 18th International Conference, DIMVA 2021, Virtual event, July 14-16, 2021, proceedings / / Leyla Bilge [and three others] (editors)
| Detection of intrusions and malware, and vulnerability assessment : 18th International Conference, DIMVA 2021, Virtual event, July 14-16, 2021, proceedings / / Leyla Bilge [and three others] (editors) |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (403 pages) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Intrusion detection systems (Computer security)
Computer security |
| ISBN | 3-030-80825-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910491023703321 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Detection of intrusions and malware, and vulnerability assessment : 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings / / Christian Kreibich, Marko Jahnke, (eds.)
| Detection of intrusions and malware, and vulnerability assessment : 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 : proceedings / / Christian Kreibich, Marko Jahnke, (eds.) |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Berlin, : Springer, 2010 |
| Descrizione fisica | 1 online resource (XII, 219 p. 55 illus.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
KreibichChristian
JahnkeMarko |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Intrusion detection systems (Computer security)
Malware (Computer software) |
| ISBN |
1-280-38778-5
9786613565709 3-642-14215-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Host Security -- HookScout: Proactive Binary-Centric Hook Detection -- Conqueror: Tamper-Proof Code Execution on Legacy Systems -- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection -- Trends -- Evaluating Bluetooth as a Medium for Botnet Command and Control -- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype -- Covertly Probing Underground Economy Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners -- Organizing Large Scale Hacking Competitions -- Intrusion Detection -- An Online Adaptive Approach to Alert Correlation -- KIDS – Keyed Intrusion Detection System -- Web Security -- Modeling and Containment of Search Worms Targeting Web Applications -- HProxy: Client-Side Detection of SSL Stripping Attacks. |
| Record Nr. | UNINA-9910485030003321 |
| Berlin, : Springer, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Intrusion detection systems / / edited by Pawel Skrobanek
| Intrusion detection systems / / edited by Pawel Skrobanek |
| Pubbl/distr/stampa | Rijeka, Croatia : , : InTech, , [2011] |
| Descrizione fisica | 1 online resource (vi, 324 pages) : illustrations |
| Disciplina | 353.00722 |
| Soggetto topico | Intrusion detection systems (Computer security) |
| ISBN | 953-51-5988-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910138287903321 |
| Rijeka, Croatia : , : InTech, , [2011] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Network anomaly detection : a machine learning perspective / / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
| Network anomaly detection : a machine learning perspective / / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita |
| Autore | Bhattacharyya Dhruba K. |
| Pubbl/distr/stampa | Boca Raton : , : CRC Press, Taylor & Francis Group, , [2014] |
| Descrizione fisica | 1 online resource (xxv, 340 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Gale eBooks |
| Soggetto topico |
Computer networks - Security measures
Intrusion detection systems (Computer security) Machine learning |
| ISBN |
0-429-16687-7
1-4665-8209-X |
| Classificazione | COM037000COM053000COM083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Acknowledgments; Abstract; Authors; 1. Introduction; 2. Networks and Anomalies; 3. An Overview of Machine Learning Methods; 4. Detecting Anomalies in Network Data; 5. Feature Selection; 6. Approaches to Network Anomaly Detection; 7. Evaluation Methods; 8. Tools and Systems; 9. Open Issues, Challenges and Concluding Remarks; References |
| Record Nr. | UNINA-9910787566503321 |
Bhattacharyya Dhruba K.
|
||
| Boca Raton : , : CRC Press, Taylor & Francis Group, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Network anomaly detection : a machine learning perspective / / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
| Network anomaly detection : a machine learning perspective / / Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita |
| Autore | Bhattacharyya Dhruba K. |
| Pubbl/distr/stampa | Boca Raton : , : CRC Press, Taylor & Francis Group, , [2014] |
| Descrizione fisica | 1 online resource (xxv, 340 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Gale eBooks |
| Soggetto topico |
Computer networks - Security measures
Intrusion detection systems (Computer security) Machine learning |
| ISBN |
0-429-16687-7
1-4665-8209-X |
| Classificazione | COM037000COM053000COM083000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Front Cover; Dedication; Contents; List of Figures; List of Tables; Preface; Acknowledgments; Abstract; Authors; 1. Introduction; 2. Networks and Anomalies; 3. An Overview of Machine Learning Methods; 4. Detecting Anomalies in Network Data; 5. Feature Selection; 6. Approaches to Network Anomaly Detection; 7. Evaluation Methods; 8. Tools and Systems; 9. Open Issues, Challenges and Concluding Remarks; References |
| Record Nr. | UNINA-9910818815903321 |
Bhattacharyya Dhruba K.
|
||
| Boca Raton : , : CRC Press, Taylor & Francis Group, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
An overview of issues in testing intrusion detection systems [[electronic resource] /] / Peter Mell ... [and others]
| An overview of issues in testing intrusion detection systems [[electronic resource] /] / Peter Mell ... [and others] |
| Pubbl/distr/stampa | [Gaithersburg, Md.] : , : [U.S. Dept. of Commerce, National Institute of Standards and Technology], , [2003?] |
| Descrizione fisica | 1 online resource (21 pages) |
| Altri autori (Persone) | MellPeter |
| Collana | [NISTIR |
| Soggetto topico |
Intrusion detection systems (Computer security)
Intrusion detection systems (Computer security) - Government policy - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Intrusion detection systems |
| Record Nr. | UNINA-9910700821103321 |
| [Gaithersburg, Md.] : , : [U.S. Dept. of Commerce, National Institute of Standards and Technology], , [2003?] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Planning for the future of cyber attack attribution [[electronic resource] ] : hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010
| Planning for the future of cyber attack attribution [[electronic resource] ] : hearing before the Subcommittee on Technology and Innovation, Committee on Science and Technology, House of Representatives, One Hundred Eleventh Congress, second session, July 15, 2010 |
| Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 2010 |
| Descrizione fisica | 1 online resource (iii, 140 pages) : illustrations |
| Soggetto topico |
Intrusion detection systems (Computer security)
Computer security - United States Cyberterrorism - United States - Prevention Computer networks - Security measures - United States Privacy, Right of - United States |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Planning for the future of cyber attack attribution |
| Record Nr. | UNINA-9910703009003321 |
| Washington : , : U.S. G.P.O., , 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
SCADA security : machine learning concepts for intrusion detection and prevention / / Abdulmohsen Almalawi [and three others]
| SCADA security : machine learning concepts for intrusion detection and prevention / / Abdulmohsen Almalawi [and three others] |
| Autore | Almalawi Abdulmohsen |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, Incorporated, , [2021] |
| Descrizione fisica | 1 online resource (219 pages) : illustrations |
| Disciplina | 629.895583 |
| Soggetto topico |
Supervisory control systems
Automatic control - Security measures Intrusion detection systems (Computer security) |
| ISBN |
1-119-60635-7
1-5231-3709-6 1-119-60638-1 1-119-60607-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910555107303321 |
Almalawi Abdulmohsen
|
||
| Hoboken, New Jersey : , : John Wiley & Sons, Incorporated, , [2021] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||