Detection of Intrusions and Malware, and Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings /

Detection of Intrusions and Malware, and Vulnerability Assessment Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proceedings / [electronic resource] : edited by Roland Büschkes, Pavel Laskov. - 1st ed. 2006. - X, 195 p. online resource. - Security and Cryptology, 4064 2946-1863 ; . - Security and Cryptology, 4064 .

Code Analysis -- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs -- Using Static Program Analysis to Aid Intrusion Detection -- Intrusion Detection -- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix -- Network–Level Polymorphic Shellcode Detection Using Emulation -- Detecting Unknown Network Attacks Using Language Models -- Threat Protection and Response -- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones -- Using Contextual Security Policies for Threat Response -- Malware and Forensics -- Detecting Self-mutating Malware Using Control-Flow Graph Matching -- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe -- Deployment Scenarios -- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs -- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.

9783540360179

10.1007/11790754 doi


Cryptography.
Data encryption (Computer science).
Electronic data processing--Management.
Computer networks .
Operating systems (Computers).
Computers and civilization.
Cryptology.
IT Operations.
Computer Communication Networks.
Operating Systems.
Computers and Society.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in