Normal view MARC view ISBD view

Detection of Intrusions and Malware, and Vulnerability Assessment [electronic resource] : Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings / edited by Roland Büschkes, Pavel Laskov.

Contributor(s): Büschkes, Roland [editor.] | Laskov, Pavel [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 4064Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006Edition: 1st ed. 2006.Description: X, 195 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540360179.Subject(s): Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Computer networks  | Operating systems (Computers) | Computers and civilization | Cryptology | IT Operations | Computer Communication Networks | Operating Systems | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network-Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network-Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.

There are no comments for this item.

Log in to your account to post a comment.