skip to content
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings Preview this item
ClosePreview this item
Checking...

Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

Author: David HutchisonJohn C MitchellMoni NaorOscar NierstraszC Pandu RanganAll authors
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Series: SpringerLink: Springer e-Books; Lecture Notes in Computer Science, 5587.
Edition/Format:   Computer file : English : Online-AusgView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: David Hutchison; John C Mitchell; Moni Naor; Oscar Nierstrasz; C Pandu Rangan; Bernhard Steffen; Madhu Sudan; Demetri Terzopoulos; Doug Tygar; Moshe Y Vardi; Gerhard Weikum; Danilo Bruschi; Ulrich Flegel; Takeo Kanade; Josef Kittler; Jon M Kleinberg; Friedemann Mattern
ISBN: 9783642029189 3642029183 9783642029172 3642029175
OCLC Number: 610029694
Reproduction Notes: Online-Ausg. Berlin [u.a.] Springer, 2009. online-Ressource.
Description: ... S.
Contents: Malware and SPAM.- A Case Study on Asprox Infection Dynamics.- How Good Are Malware Detectors at Remediating Infected Systems?.- Towards Proactive Spam Filtering (Extended Abstract).- Emulation-Based Detection.- Shepherding Loadable Kernel Modules through On-demand Emulation.- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks.- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks.- Software Diversity.- Polymorphing Software by Randomizing Data Structure Layout.- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.- Harnessing Context.- Using Contextual Information for IDS Alarm Classification (Extended Abstract).- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications.- A Service Dependency Modeling Framework for Policy-Based Response Enforcement.- Anomaly Detection.- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract).- Selecting and Improving System Call Models for Anomaly Detection.
Series Title: SpringerLink: Springer e-Books; Lecture Notes in Computer Science, 5587.
Responsibility: edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Ulrich Flegel, Danilo Bruschi.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/610029694>
library:oclcnum"610029694"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/610029694>
rdf:typej.2:Computer_file
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:author
schema:bookEdition"Online-Ausg."
schema:datePublished"2009"
schema:exampleOfWork<http://worldcat.org/entity/work/id/1953504827>
schema:inLanguage"en"
schema:name"Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings"
schema:publisher
schema:url
schema:url
schema:workExample
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.