Cantitate/Preț
Produs

Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings: Lecture Notes in Computer Science, cartea 12223

Editat de Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves
en Limba Engleză Paperback – 4 iul 2020
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.*
The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment.
​*The conference was held virtually due to the COVID-19 pandemic.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32570 lei

Preț vechi: 40713 lei
-20% Nou

Puncte Express: 489

Preț estimativ în valută:
6233 6475$ 5178£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030526825
ISBN-10: 3030526828
Pagini: 500
Ilustrații: XII, 281 p. 234 illus., 60 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.42 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Vulnerability Discovery and Analysis.- Automated CPE labeling of CVE summaries with Machine Learning.- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks.- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective.- Attacks.- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode.- HAEPG: An Automatic Multi-hop Exploitation Generation Framework.- Understanding Android VoIP Security: A System-level Vulnerability Assessment.- Web Security.- Web Runner 2049: Evaluating Third-Party Anti-bot Services.- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers.- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.- On the Security of Application Installers & Online Software Repositories.- Detection and Containment.- Distributed Heterogeneous N-Variant Execution.- Sec2graph:Network Attack Detection based on Novelty Detection on Graph Structured Data.- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.