skip to content
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings Preview this item
ClosePreview this item
Checking...

Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings

Author: David HutchisonJohn C MitchellMoni NaorOscar NierstraszC Pandu RanganAll authors
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Series: SpringerLink: Springer e-Books; Lecture Notes in Computer Science, 5587.
Edition/Format:   Computer file : English : Online-ausgView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: David Hutchison; John C Mitchell; Moni Naor; Oscar Nierstrasz; C Pandu Rangan; Bernhard Steffen; Madhu Sudan; Demetri Terzopoulos; Doug Tygar; Moshe Y Vardi; Gerhard Weikum; Danilo Bruschi; Ulrich Flegel; Takeo Kanade; Josef Kittler; Jon M Kleinberg; Friedemann Mattern
ISBN: 9783642029189 3642029183 9783642029172 3642029175
OCLC Number: 610029694
Reproduction Notes: Online-Ausg. Berlin [u.a.] Springer, 2009. online-Ressource.
Description: S.
Contents: Malware and SPAM.- A Case Study on Asprox Infection Dynamics.- How Good Are Malware Detectors at Remediating Infected Systems?.- Towards Proactive Spam Filtering (Extended Abstract).- Emulation-Based Detection.- Shepherding Loadable Kernel Modules through On-demand Emulation.- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks.- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks.- Software Diversity.- Polymorphing Software by Randomizing Data Structure Layout.- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities.- Harnessing Context.- Using Contextual Information for IDS Alarm Classification (Extended Abstract).- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications.- A Service Dependency Modeling Framework for Policy-Based Response Enforcement.- Anomaly Detection.- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract).- Selecting and Improving System Call Models for Anomaly Detection.
Series Title: SpringerLink: Springer e-Books; Lecture Notes in Computer Science, 5587.
Responsibility: edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Ulrich Flegel, Danilo Bruschi.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/610029694> # Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
    a bgn:ComputerFile, schema:CreativeWork ;
   library:oclcnum "610029694" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/899999335#Place/berlin_heidelberg> ; # Berlin, Heidelberg
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   schema:about <http://id.loc.gov/authorities/subjects/sh89003285> ; # Computer science
   schema:about <http://experiment.worldcat.org/entity/work/data/899999335#Topic/computer_communication_networks> ; # Computer Communication Networks
   schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
   schema:about <http://id.loc.gov/authorities/subjects/sh85035859> ; # Data protection
   schema:about <http://experiment.worldcat.org/entity/work/data/899999335#Topic/computer_science> ; # Computer Science
   schema:about <http://dewey.info/class/005.82/> ;
   schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
   schema:about <http://experiment.worldcat.org/entity/work/data/899999335#Topic/information_systems> ; # Information Systems
   schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
   schema:author <http://viaf.org/viaf/32154680> ; # Madhu Sudan
   schema:author <http://viaf.org/viaf/58291480> ; # John C. Mitchell
   schema:author <http://viaf.org/viaf/38149066394665601007> ; # Doug Tygar
   schema:author <http://viaf.org/viaf/33986892> ; # Ulrich Flegel
   schema:author <http://viaf.org/viaf/100774663> ; # Danilo Bruschi
   schema:author <http://viaf.org/viaf/42887943> ; # Moshe Y. Vardi
   schema:author <http://viaf.org/viaf/108720184> ; # David Hutchison
   schema:author <http://viaf.org/viaf/162691482> ; # Jon M. Kleinberg
   schema:author <http://viaf.org/viaf/32249261> ; # Oscar Nierstrasz
   schema:author <http://viaf.org/viaf/162245894> ; # Gerhard Weikum
   schema:author <http://viaf.org/viaf/114470255> ; # Friedemann Mattern
   schema:author <http://viaf.org/viaf/41918393> ; # Josef Kittler
   schema:author <http://viaf.org/viaf/67527661> ; # Moni Naor
   schema:author <http://viaf.org/viaf/57063007> ; # Bernhard Steffen
   schema:author <http://viaf.org/viaf/85212989> ; # C. Pandu Rangan
   schema:author <http://viaf.org/viaf/10004382> ; # Demetri Terzopoulos
   schema:author <http://viaf.org/viaf/61636213> ; # Takeo Kanade
   schema:bookEdition "Online-ausg." ;
   schema:datePublished "2009" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/899999335> ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/899999335#Series/springerlink_springer_e_books> ; # SpringerLink: Springer e-Books
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/899999335#Series/lecture_notes_in_computer_science> ; # Lecture Notes in Computer Science ;
   schema:name "Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings" ;
   schema:productID "610029694" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/610029694#PublicationEvent/berlin_heidelberg_springer_berlin_heidelberg_2009> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/899999335#Agent/springer_berlin_heidelberg> ; # Springer Berlin Heidelberg
   schema:url <http://dx.doi.org/10.1007/978-3-642-02918-9> ;
   schema:url <http://sfx.metabib.ch:9003/sfx_locater?sid=ALEPH:DSV01&genre=book&isbn=978-3-642-02918-9&id=doi:10.1007/978-3-642-02918-9> ;
   schema:workExample <http://worldcat.org/isbn/9783642029172> ;
   schema:workExample <http://worldcat.org/isbn/9783642029189> ;
   schema:workExample <http://dx.doi.org/10.1007/978-3-642-02918-9> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/610029694> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/899999335#Agent/springer_berlin_heidelberg> # Springer Berlin Heidelberg
    a bgn:Agent ;
   schema:name "Springer Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/899999335#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
   schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/899999335#Series/lecture_notes_in_computer_science> # Lecture Notes in Computer Science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/610029694> ; # Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
   schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/899999335#Series/springerlink_springer_e_books> # SpringerLink: Springer e-Books
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/610029694> ; # Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
   schema:name "SpringerLink: Springer e-Books" ;
    .

<http://experiment.worldcat.org/entity/work/data/899999335#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
   schema:name "Computer Communication Networks" ;
    .

<http://experiment.worldcat.org/entity/work/data/899999335#Topic/information_systems> # Information Systems
    a schema:Intangible ;
   schema:name "Information Systems" ;
    .

<http://id.loc.gov/authorities/subjects/sh85035859> # Data protection
    a schema:Intangible ;
   schema:name "Data protection" ;
    .

<http://id.loc.gov/authorities/subjects/sh89003285> # Computer science
    a schema:Intangible ;
   schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
   schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
   schema:name "Data encryption (Computer science)" ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
   schema:name "Data protection" ;
    .

<http://viaf.org/viaf/10004382> # Demetri Terzopoulos
    a schema:Person ;
   schema:familyName "Terzopoulos" ;
   schema:givenName "Demetri" ;
   schema:name "Demetri Terzopoulos" ;
    .

<http://viaf.org/viaf/100774663> # Danilo Bruschi
    a schema:Person ;
   schema:familyName "Bruschi" ;
   schema:givenName "Danilo" ;
   schema:name "Danilo Bruschi" ;
    .

<http://viaf.org/viaf/108720184> # David Hutchison
    a schema:Person ;
   schema:familyName "Hutchison" ;
   schema:givenName "David" ;
   schema:name "David Hutchison" ;
    .

<http://viaf.org/viaf/114470255> # Friedemann Mattern
    a schema:Person ;
   schema:familyName "Mattern" ;
   schema:givenName "Friedemann" ;
   schema:name "Friedemann Mattern" ;
    .

<http://viaf.org/viaf/162245894> # Gerhard Weikum
    a schema:Person ;
   schema:familyName "Weikum" ;
   schema:givenName "Gerhard" ;
   schema:name "Gerhard Weikum" ;
    .

<http://viaf.org/viaf/162691482> # Jon M. Kleinberg
    a schema:Person ;
   schema:familyName "Kleinberg" ;
   schema:givenName "Jon M." ;
   schema:name "Jon M. Kleinberg" ;
    .

<http://viaf.org/viaf/32154680> # Madhu Sudan
    a schema:Person ;
   schema:familyName "Sudan" ;
   schema:givenName "Madhu" ;
   schema:name "Madhu Sudan" ;
    .

<http://viaf.org/viaf/32249261> # Oscar Nierstrasz
    a schema:Person ;
   schema:familyName "Nierstrasz" ;
   schema:givenName "Oscar" ;
   schema:name "Oscar Nierstrasz" ;
    .

<http://viaf.org/viaf/33986892> # Ulrich Flegel
    a schema:Person ;
   schema:familyName "Flegel" ;
   schema:givenName "Ulrich" ;
   schema:name "Ulrich Flegel" ;
    .

<http://viaf.org/viaf/38149066394665601007> # Doug Tygar
    a schema:Person ;
   schema:familyName "Tygar" ;
   schema:givenName "Doug" ;
   schema:name "Doug Tygar" ;
    .

<http://viaf.org/viaf/41918393> # Josef Kittler
    a schema:Person ;
   schema:familyName "Kittler" ;
   schema:givenName "Josef" ;
   schema:name "Josef Kittler" ;
    .

<http://viaf.org/viaf/42887943> # Moshe Y. Vardi
    a schema:Person ;
   schema:familyName "Vardi" ;
   schema:givenName "Moshe Y." ;
   schema:name "Moshe Y. Vardi" ;
    .

<http://viaf.org/viaf/57063007> # Bernhard Steffen
    a schema:Person ;
   schema:familyName "Steffen" ;
   schema:givenName "Bernhard" ;
   schema:name "Bernhard Steffen" ;
    .

<http://viaf.org/viaf/58291480> # John C. Mitchell
    a schema:Person ;
   schema:familyName "Mitchell" ;
   schema:givenName "John C." ;
   schema:name "John C. Mitchell" ;
    .

<http://viaf.org/viaf/61636213> # Takeo Kanade
    a schema:Person ;
   schema:familyName "Kanade" ;
   schema:givenName "Takeo" ;
   schema:name "Takeo Kanade" ;
    .

<http://viaf.org/viaf/67527661> # Moni Naor
    a schema:Person ;
   schema:familyName "Naor" ;
   schema:givenName "Moni" ;
   schema:name "Moni Naor" ;
    .

<http://viaf.org/viaf/85212989> # C. Pandu Rangan
    a schema:Person ;
   schema:familyName "Pandu Rangan" ;
   schema:givenName "C." ;
   schema:name "C. Pandu Rangan" ;
    .

<http://worldcat.org/isbn/9783642029172>
    a schema:ProductModel ;
   schema:isbn "3642029175" ;
   schema:isbn "9783642029172" ;
    .

<http://worldcat.org/isbn/9783642029189>
    a schema:ProductModel ;
   schema:isbn "3642029183" ;
   schema:isbn "9783642029189" ;
    .

<http://www.worldcat.org/title/-/oclc/610029694>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/610029694> ; # Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
   schema:dateModified "2017-12-25" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.