Buch, Englisch, Band 2516, 327 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1070 g
5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings
Buch, Englisch, Band 2516, 327 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1070 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-00020-4
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
Weitere Infos & Material
Stepping Stone Detection.- Detecting Long Connection Chains of Interactive Terminal Sessions.- Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay.- Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.- Anomaly Detection.- Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits.- Correlation.- Analyzing Intensive Intrusion Alerts via Correlation.- A Mission-Impact-Based Approach to INFOSEC Alarm Correlation.- M2D2: A Formal Data Model for IDS Alert Correlation.- Legal Aspects / Intrusion Tolerance.- Development of a Legal Framework for Intrusion Detection.- Learning Unknown Attacks — A Start.- Assessment of Intrusion Detection Systems.- Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems.- A Stochastic Model for Intrusions.- Attacks against Computer Network: Formal Grammar-Based Framework and Simulation Tool.- Capacity Verification for High Speed Network Intrusion Detection Systems.- Adaptive Intrusion Detection Systems.- Performance Adaptation in Real-Time Intrusion Detection Systems.- Intrusion Detection Analysis.- Accurate Buffer Overflow Detection via Abstract Pay load Execution.- Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level.- The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection.