|
|
|
|
| LEADER |
03174nam a2200577 4500 |
| 001 |
978-3-319-93411-2 |
| 003 |
DE-He213 |
| 005 |
20191024051242.0 |
| 007 |
cr nn 008mamaa |
| 008 |
180607s2018 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783319934112
|9 978-3-319-93411-2
|
| 024 |
7 |
|
|a 10.1007/978-3-319-93411-2
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a QA76.9.A25
|
| 072 |
|
7 |
|a UR
|2 bicssc
|
| 072 |
|
7 |
|a COM053000
|2 bisacsh
|
| 072 |
|
7 |
|a UR
|2 thema
|
| 072 |
|
7 |
|a UTN
|2 thema
|
| 082 |
0 |
4 |
|a 005.8
|2 23
|
| 245 |
1 |
0 |
|a Detection of Intrusions and Malware, and Vulnerability Assessment
|h [electronic resource] :
|b 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings /
|c edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc.
|
| 250 |
|
|
|a 1st ed. 2018.
|
| 264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
| 300 |
|
|
|a XII, 405 p. 93 illus.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Security and Cryptology ;
|v 10885
|
| 505 |
0 |
|
|a Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering.
|
| 520 |
|
|
|a This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.
|
| 650 |
|
0 |
|a Computer security.
|
| 650 |
|
0 |
|a Operating systems (Computers).
|
| 650 |
|
0 |
|a Computers.
|
| 650 |
|
0 |
|a Law and legislation.
|
| 650 |
|
0 |
|a Computers and civilization.
|
| 650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
| 650 |
2 |
4 |
|a Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14045
|
| 650 |
2 |
4 |
|a Legal Aspects of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I24059
|
| 650 |
2 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
| 700 |
1 |
|
|a Giuffrida, Cristiano.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Bardin, Sébastien.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Blanc, Gregory.
|e editor.
|0 (orcid)0000-0001-8150-6617
|1 https://orcid.org/0000-0001-8150-6617
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783319934105
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783319934129
|
| 830 |
|
0 |
|a Security and Cryptology ;
|v 10885
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-93411-2
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 912 |
|
|
|a ZDB-2-LNC
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|