Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings /

This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13 revised full papers presented together with one extended abstract were carefully reviewed and...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Dietrich, Sven (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2014.
Σειρά:Lecture Notes in Computer Science, 8550
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03249nam a22005055i 4500
001 978-3-319-08509-8
003 DE-He213
005 20151204161747.0
007 cr nn 008mamaa
008 140613s2014 gw | s |||| 0|eng d
020 |a 9783319085098  |9 978-3-319-08509-8 
024 7 |a 10.1007/978-3-319-08509-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Detection of Intrusions and Malware, and Vulnerability Assessment  |h [electronic resource] :  |b 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings /  |c edited by Sven Dietrich. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XII, 277 p. 90 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8550 
505 0 |a Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware -- AndRadar: Fast Discovery of Android Applications in Alternative Markets -- Attacks on Android Clipboard.- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.- AV-Meter: An Evaluation of Antivirus Scans and Labels.- PExy: The Other Side of Exploit Kits.- Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.- Parallelization of Network Intrusion Detection Systems under Attack Conditions.- Phoenix: DGA-Based Botnet Tracking and Intelligence -- Quantifiable Run-Time Kernel Attack Surface Reduction.- Bee Master: Detecting Host-Based Code Injection Attacks.- Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. 
520 |a This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on malware, mobile security, network security and host security. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 0 |a Management information systems. 
650 0 |a E-commerce. 
650 1 4 |a Computer Science. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a Management of Computing and Information Systems. 
700 1 |a Dietrich, Sven.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319085081 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8550 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-08509-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)