Cantitate/Preț
Produs

Recent Advances in Intrusion Detection: 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, Proceedings: Lecture Notes in Computer Science, cartea 4637

Editat de Christopher Kruegel, Richard Lippmann, Andrew Clark
en Limba Engleză Paperback – 14 aug 2007

Din seria Lecture Notes in Computer Science

Preț: 39275 lei

Nou

Puncte Express: 589

Preț estimativ în valută:
7517 7747$ 6346£

Carte tipărită la comandă

Livrare economică 03-17 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540743194
ISBN-10: 3540743197
Pagini: 354
Ilustrații: XII, 340 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.53 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Host-Based Intrusion Detection.- Exploiting Execution Context for the Detection of Anomalous System Calls.- Understanding Precision in Host Based Intrusion Detection.- Anomaly-Based Intrusion Detection.- Comparing Anomaly Detection Techniques for HTTP.- Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.- Network-Based Intrusion Detection and Response.- Emulation-Based Detection of Non-self-contained Polymorphic Shellcode.- The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware.- Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks.- Insider Detection and Alert Correlation.- elicit: A System for Detecting Insiders Who Violate Need-to-Know.- On the Use of Different Statistical Tests for Alert Correlation – Short Paper.- Malicious Code Analysis.- Automated Classification and Analysis of Internet Malware.- “Out-of-the-Box” Monitoring of VM-Based High-Interaction Honeypots.- A Forced Sampled Execution Approach to Kernel Rootkit Identification.- Evasion.- Advanced Allergy Attacks: Does a Corpus Really Help?.- Alert Verification Evasion Through Server Response Forging.- Malicious Code Defense.- Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs.- SpyShield: Preserving Privacy from Spy Add-Ons.- Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems.