Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedings / [electronic resource] : edited by Roland Büschkes, Pavel Laskov. - Berlin, Heidelberg : Springer Berlin Heidelberg, 2006. - X, 195 p. Also available online. online resource. - Lecture Notes in Computer Science, 4064 0302-9743 ; . - Lecture Notes in Computer Science, 4064 .

Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network–Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.

9783540360179

10.1007/11790754 doi


Computer science.
Computer Communication Networks.
Operating systems (Computers).
Data encryption (Computer science).
Information Systems.
Computer Science.
Data Encryption.
Management of Computing and Information Systems.
Computer Communication Networks.
Operating Systems.
Computers and Society.

QA76.9.A25

005.82
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha