Almgren / Maggi / Gulisano | Detection of Intrusions and Malware, and Vulnerability Assessment | Buch | 978-3-319-20549-6 | sack.de

Buch, Englisch, Band 9148, 351 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5504 g

Reihe: Lecture Notes in Computer Science

Almgren / Maggi / Gulisano

Detection of Intrusions and Malware, and Vulnerability Assessment

12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
2015
ISBN: 978-3-319-20549-6
Verlag: Springer International Publishing

12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings

Buch, Englisch, Band 9148, 351 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 5504 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-319-20549-6
Verlag: Springer International Publishing


This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015.
The 17 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on attacks, attack detection, binary analysis and mobile malware protection, social networks and large-scale attacks, Web and mobile security, and provenance and data sharing.
Almgren / Maggi / Gulisano Detection of Intrusions and Malware, and Vulnerability Assessment jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.- “Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.- C5: Cross-Cores Cache Covert Channel.- Intrusion Detection for Airborne Communication Using PHY-Layer Information.- That Ain’t You: Blocking Spearphishing Through Behavioral Modelling.- Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics.- Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.- Fine-Grained Control-Flow Integrity Through Binary Hardening.- Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.- The Role of Cloud Services in MaliciousSoftware: Trends and Insights.- Capturing DDoS Attack Dynamics Behind the Scenes.- Quit Playing Games with My Heart: Understanding Online Dating Scams.- More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.- May I? - Content Security Policy Endorsement for Browser Extensions.- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.- Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.- Controlled Data Sharing for Collaborative Predictive Blacklisting.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.