E-Book, Englisch, 195 Seiten, eBook
Reihe: Security and Cryptology
Büschkes / Laskov Detection of Intrusions and Malware, and Vulnerability Assessment
2006
ISBN: 978-3-540-36017-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings
E-Book, Englisch, 195 Seiten, eBook
Reihe: Security and Cryptology
ISBN: 978-3-540-36017-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Code Analysis.- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.- Using Static Program Analysis to Aid Intrusion Detection.- Intrusion Detection.- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix.- Network–Level Polymorphic Shellcode Detection Using Emulation.- Detecting Unknown Network Attacks Using Language Models.- Threat Protection and Response.- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.- Using Contextual Security Policies for Threat Response.- Malware and Forensics.- Detecting Self-mutating Malware Using Control-Flow Graph Matching.- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.- Deployment Scenarios.- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs.- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.