Cantitate/Preț
Produs

Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings: Lecture Notes in Computer Science, cartea 13358

Editat de Lorenzo Cavallaro, Daniel Gruss, Giancarlo Pellegrino, Giorgio Giacinto
en Limba Engleză Paperback – 25 iun 2022
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021.
The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions. 
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 46204 lei

Preț vechi: 57755 lei
-20% Nou

Puncte Express: 693

Preț estimativ în valută:
8842 9185$ 7345£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031094835
ISBN-10: 3031094832
Pagini: 219
Ilustrații: XII, 219 p. 63 illus., 51 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.33 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Hybrid Pruning: Towards A Precise Static Analysis.- Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models.- Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.- COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.- Prioritizing Antivirus Alerts on Internal Enterprise Machines.- VANDALIR: Vulnerability Analyses based on Datalog and LLVM-IR.- Branch Different - Spectre Attacks on Apple Silicon.- MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys .- A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities.- Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.- Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.