Normal view MARC view ISBD view

Detection of Intrusions and Malware, and Vulnerability Assessment [electronic resource] : 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings / edited by Bernhard Hämmerli, Robin Sommer.

Contributor(s): Hämmerli, Bernhard [editor.] | Sommer, Robin [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 4579Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007Edition: 1st ed. 2007.Description: X, 254 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540736141.Subject(s): Cryptography | Data encryption (Computer science) | Electronic data processing -- Management | Computer networks  | Data protection | Computers and civilization | Cryptology | IT Operations | Computer Communication Networks | Data and Information Security | Computers and SocietyAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against "JavaScript Malware" and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots' Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against "JavaScript Malware" and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots' Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents.

There are no comments for this item.

Log in to your account to post a comment.