Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings / [electronic resource] :
edited by Michalis Polychronakis, Michael Meier.
- 1st ed. 2017.
- X, 412 p. 114 illus. online resource.
- Security and Cryptology, 10327 2946-1863 ; .
- Security and Cryptology, 10327 .
Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
9783319608761
10.1007/978-3-319-60876-1 doi
Data protection.
Operating systems (Computers).
Computers--Law and legislation.
Information technology--Law and legislation.
Computers and civilization.
Application software.
Cryptography.
Data encryption (Computer science).
Data and Information Security.
Operating Systems.
Legal Aspects of Computing.
Computers and Society.
Computer and Information Systems Applications.
Cryptology.
QA76.9.A25
005.8
Enclaves and isolation -- Malware analysis -- Cyber-physical systems -- Detection and protection.-Code analysis -- Web security.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. They present topics such as enclaves and isolation; malware analysis; cyber-physical systems; detection and protection; code analysis; and web security.
9783319608761
10.1007/978-3-319-60876-1 doi
Data protection.
Operating systems (Computers).
Computers--Law and legislation.
Information technology--Law and legislation.
Computers and civilization.
Application software.
Cryptography.
Data encryption (Computer science).
Data and Information Security.
Operating Systems.
Legal Aspects of Computing.
Computers and Society.
Computer and Information Systems Applications.
Cryptology.
QA76.9.A25
005.8