Normal view MARC view ISBD view

Recent Advances in Intrusion Detection [electronic resource] : 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011, Proceedings / edited by Robin Sommer, Davide Balzarotti, Gregor Maier.

Contributor(s): Sommer, Robin [editor.] | Balzarotti, Davide [editor.] | Maier, Gregor [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 6961Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: X, 399 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642236440.Subject(s): Computer networks  | Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Computers and civilization | Algorithms | Data structures (Computer science) | Information theory | Computer Communication Networks | Cryptology | IT Operations | Computers and Society | Algorithms | Data Structures and Information TheoryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.

There are no comments for this item.

Log in to your account to post a comment.