Cantitate/Preț
Produs

Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6307

Editat de Somesh Jha, Robin Sommer, Christian Kreibich
en Limba Engleză Paperback – 2 sep 2010

Din seria Lecture Notes in Computer Science

Preț: 33623 lei

Preț vechi: 42029 lei
-20% Nou

Puncte Express: 504

Preț estimativ în valută:
6435 6707$ 5357£

Carte disponibilă

Livrare economică 16-30 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642155116
ISBN-10: 3642155111
Pagini: 524
Ilustrații: 524 p. 160 illus.
Greutate: 0.79 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Network Protection.- What Is the Impact of P2P Traffic on Anomaly Detection?.- A Centralized Monitoring Infrastructure for Improving DNS Security.- Behavior-Based Worm Detectors Compared.- High Performance.- Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams.- GrAVity: A Massively Parallel Antivirus Engine.- Malware Detection and Defence.- Automatic Discovery of Parasitic Malware.- BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection.- CANVuS: Context-Aware Network Vulnerability Scanning.- HyperCheck: A Hardware-Assisted Integrity Monitor.- Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory.- Bait Your Hook: A Novel Detection Technique for Keyloggers.- Evaluation.- Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security.- On Challenges in Evaluating Malware Clustering.- Why Did My Detector Do That?!.- Forensics.- NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring.- Live and Trustworthy Forensic Analysis of Commodity Production Systems.- Hybrid Analysis and Control of Malware.- Anomaly Detection.- Anomaly Detection and Mitigation for Disaster Area Networks.- Community Epidemic Detection Using Time-Correlated Anomalies.- A Data-Centric Approach to Insider Attack Detection in Database Systems.- Privilege States Based Access Control for Fine-Grained Intrusion Response.- Web Security.- Abusing Social Networks for Automated User Profiling.- An Analysis of Rogue AV Campaigns.- Fast-Flux Bot Detection in Real Time.- Posters.- A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.- A Distributed Honeynet at KFUPM: A Case Study.- Aspect-BasedAttack Detection in Large-Scale Networks.- Detecting Network Anomalies in Backbone Networks.- Detecting the Onset of Infection for Secure Hosts.- Eliminating Human Specification in Static Analysis.- Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009.- Inferring Protocol State Machine from Real-World Trace.- MEDUSA: Mining Events to Detect Undesirable uSer Actions in SCADA.- On Estimating Cyber Adversaries’ Capabilities: A Bayesian Model Approach.- Security System for Encrypted Environments (S2E2).- Towards Automatic Deduction and Event Reconstruction Using Forensic Lucid and Probabilities to Encode the IDS Evidence.- Toward Specification-Based Intrusion Detection for Web Applications.- Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices.- Using IRP for Malware Detection.

Caracteristici

up-to-date results fast track conference proceedings state-of-the-art report