Detection of Intrusions and Malware, and Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings / [electronic resource] :
edited by Roland Büschkes, Pavel Laskov.
- 1st ed. 2006.
- X, 195 p. online resource.
- Security and Cryptology, 4064 2946-1863 ; .
- Security and Cryptology, 4064 .
Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network-Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.
9783540360179
10.1007/11790754 doi
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computer networks .
Operating systems (Computers).
Computers and civilization.
Cryptology.
IT Operations.
Computer Communication Networks.
Operating Systems.
Computers and Society.
QA268
005.824
Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network-Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.
9783540360179
10.1007/11790754 doi
Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computer networks .
Operating systems (Computers).
Computers and civilization.
Cryptology.
IT Operations.
Computer Communication Networks.
Operating Systems.
Computers and Society.
QA268
005.824