Detection of Intrusions and Malware, and Vulnerability Assessment 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6201 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Host Security
- HookScout: Proactive Binary-Centric Hook Detection
- Conqueror: Tamper-Proof Code Execution on Legacy Systems
- dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
- Trends
- Evaluating Bluetooth as a Medium for Botnet Command and Control
- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
- Covertly Probing Underground Economy Marketplaces
- Vulnerabilities
- Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
- Organizing Large Scale Hacking Competitions
- Intrusion Detection
- An Online Adaptive Approach to Alert Correlation
- KIDS - Keyed Intrusion Detection System
- Web Security
- Modeling and Containment of Search Worms Targeting Web Applications
- HProxy: Client-Side Detection of SSL Stripping Attacks.