Detection of Intrusions and Malware, and Vulnerability Assessment 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings / [electronic resource] :
edited by Thorsten Holz, Herbert Bos.
- 1st ed. 2011.
- X, 235 p. 86 illus., 44 illus. in color. online resource.
- Security and Cryptology, 6739 2946-1863 ; .
- Security and Cryptology, 6739 .
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
9783642224249
10.1007/978-3-642-22424-9 doi
Computer networks .
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Application software.
Algorithms.
Computer Communication Networks.
IT Operations.
Cryptology.
Computers and Society.
Computer and Information Systems Applications.
Algorithms.
TK5105.5-5105.9
004.6
This book constitutes the refereed proceedings of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July 2011. The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intial submissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.
9783642224249
10.1007/978-3-642-22424-9 doi
Computer networks .
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Application software.
Algorithms.
Computer Communication Networks.
IT Operations.
Cryptology.
Computers and Society.
Computer and Information Systems Applications.
Algorithms.
TK5105.5-5105.9
004.6