Cargando…

Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings /

This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13 revised full papers presented together with one extended abstract were carefully reviewed and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Dietrich, Sven (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Colección:Security and Cryptology ; 8550
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-08509-8
003 DE-He213
005 20220115072239.0
007 cr nn 008mamaa
008 140613s2014 sz | s |||| 0|eng d
020 |a 9783319085098  |9 978-3-319-08509-8 
024 7 |a 10.1007/978-3-319-08509-8  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Detection of Intrusions and Malware, and Vulnerability Assessment  |h [electronic resource] :  |b 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings /  |c edited by Sven Dietrich. 
250 |a 1st ed. 2014. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XII, 277 p. 90 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 8550 
505 0 |a Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware -- AndRadar: Fast Discovery of Android Applications in Alternative Markets -- Attacks on Android Clipboard.- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.- AV-Meter: An Evaluation of Antivirus Scans and Labels.- PExy: The Other Side of Exploit Kits.- Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.- Parallelization of Network Intrusion Detection Systems under Attack Conditions.- Phoenix: DGA-Based Botnet Tracking and Intelligence -- Quantifiable Run-Time Kernel Attack Surface Reduction.- Bee Master: Detecting Host-Based Code Injection Attacks.- Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. 
520 |a This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on malware, mobile security, network security and host security. 
650 0 |a Data protection. 
650 0 |a Electronic commerce. 
650 0 |a Electronic data processing-Management. 
650 1 4 |a Data and Information Security. 
650 2 4 |a e-Commerce and e-Business. 
650 2 4 |a IT Operations. 
700 1 |a Dietrich, Sven.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319085104 
776 0 8 |i Printed edition:  |z 9783319085081 
830 0 |a Security and Cryptology ;  |v 8550 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-08509-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)