Malware Detection
Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly depen...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Boston, MA :
Springer US,
2007.
|
Σειρά: | Advances in Information Security,
27 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Overview
- Malware Evolution: A Snapshot of Threats and Countermeasures in 2005
- Software Analysis and Assurance
- Static Disassembly and Code Analysis
- A Next-Generation Platform for Analyzing Executables
- Behavioral and Structural Properties of Malicious Code
- Detection and Prevention of SQL Injection Attacks
- Distributed Threat Detection and Defense
- Very Fast Containment of Scanning Worms, Revisited
- Sting: An End-to-End Self-Healing System for Defending against Internet Worms
- An Inside Look at Botnets
- Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
- Stealthy and Targeted Threat Detection and Defense
- Composite Hybrid Techniques For Defending Against Targeted Attacks
- Towards Stealthy Malware Detection
- Novel Techniques for Constructing Trustworthy Services
- Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems
- Principles of Secure Information Flow Analysis.