Staff View for: Research in Attacks, Intrusions, and Def

 Staff view

You must be logged in to Tag Records

Research in Attacks, Intrusions, and Defenses [electronic resource] : 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings /

Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.).

Book Cover
Names: Balzarotti, Davide. | Stolfo, Salvatore J. | Cova, Marco.
Published: Berlin ; Springer, c2012.
Series: Lecture notes in computer science ; 7462.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer networks - Security measures - Congresses. | Computer networks - Access control - Congresses. | Computer security - Congresses.
Genres: Conference proceedings. | Electronic books.
Tags: Add

Spaces will separate tags.
Use quotes for multi-word tags.

000 07285cam a2200685Ka 4500
001 13029404
005 20200514144200.0
006 m o d
007 cr cnu---unuuu
008 121009s2012 gw ob 101 0 eng d
020 |a9783642333385 (electronic bk.)
020 |a3642333389 (electronic bk.)
020 |z9783642333378
035 |a(OCoLC)ocn812300535
035 |a(CSUdb)681626
049 |aIAAA
050 4|aTK5105.59|b.R35 2012
082 04|a005.8|223
111 2 |aRAID 2012|d(2012 :|cAmsterdam, Netherlands)
245 10|aResearch in Attacks, Intrusions, and Defenses|h[electronic resource] :|b15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings /|cDavide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.).
246 3 |aRAID 2012
260 |aBerlin ;|aNew York :|bSpringer,|cc2012.
300 |a1 online resource.
490 1 |aLecture notes in computer science,|x0302-9743 ;|v7462
490 1 |aLNCS sublibrary. SL 4, Security and cryptology
500 |aInternational conference proceedings.
504 |aIncludes bibliographical references and author index.
505 00|tTrusted VM Snapshots in Untrusted Cloud Infrastructures /|rAbhinav Srivastava, Himanshu Raj, Jonathon Giffin and Paul England --|tSecure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection /|rMartim Carbone, Matthew Conover, Bruce Montague and Wenke Lee --|tAssessing the Trustworthiness of Drivers /|rShengzhi Zhang and Peng Liu --|tIndustrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat /|rOlivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan and Martin Lee --|tMemory Errors: The Past, the Present, and the Future /|rVictor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro and Herbert Bos --|tA Memory Access Validation Scheme against Payload Injection Attacks /|rDongkyun Ahn and Gyungho Lee --|tDione: A Flexible Disk Monitoring and Analysis Framework /|rJennifer Mankin and David Kaeli --|tAK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks /|rZhi Xu, Hungyuan Hsu, Xin Chen, Sencun Zhu and Ali R. Hurson --|tPaying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes /|rTobias Lauinger, Engin Kirda and Pietro Michiardi --
505 00|tProactive Discovery of Phishing Related Domain Names /|rSamuel Marchal, Jérôme François, Radu State and Thomas Engel --|tEvaluating Electricity Theft Detectors in Smart Grid Networks /|rDaisuke Mashima and Alvaro A. Cárdenas --|tPoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks /|rJialong Zhang, Chao Yang, Zhaoyan Xu and Guofei Gu --|tDEMACRO: Defense against Malicious Cross-Domain Requests /|rSebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens and Martin Johns --|tFlashDetect: ActionScript 3 Malware Detection /|rTimon Van Overveldt, Christopher Kruegel and Giovanni Vigna --|tALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection /|rJie Chu, Zihui Ge, Richard Huber, Ping Ji and Jennifer Yates, et al. --|tA Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence /|rBernhard Amann, Robin Sommer, Aashish Sharma and Seth Hall --|tGPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors /|rVictor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish and Min Sik Kim, et al. --
505 00|tN-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols /|rDina Hadžiosmanović, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon and Sandro Etalle --|tOnline Social Networks, a Criminals Multipurpose Toolbox|g(Poster Abstract) /|rShah Mahmood and Yvo Desmedt --|tThe Triple-Channel Model: Toward Robust and Efficient Advanced Botnets|g(Poster Abstract) /|rCui Xiang, Shi Jinqiao, Liao Peng and Liu Chaoge --|tNetwork Security Analysis Method Taking into Account the Usage Information|g(Poster Abstract) /|rWu Jinyu, Yin Lihua and Fang Binxing --|tAutomatic Covert Channel Detection in Asbestos System|g(Poster Abstract) /|rShuyuan Jin, Zhi Yang and Xiang Cui --|tEFA for Efficient Regular Expression Matching in NIDS|g(Poster Abstract) /|rDengke Qiao, Tingwen Liu, Yong Sun and Li Guo --|tDistress Detection|g(Poster Abstract) /|rMark Vella, Sotirios Terzis and Marc Roper --|tTrie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System|g(Poster Abstract) /|rJenny Andrea Pinto Sánchez and Luis Javier García Villalba --
505 00|tTowards Automated Forensic Event Reconstruction of Malicious Code|g(Poster Abstract) /|rAhmed F. Shosha, Joshua I. James, Chen-Ching Liu and Pavel Gladyshev --|tAccurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract) /|rLukáš Ďurfina, Jakub Křoustek, Petr Zemek and Břetislav Kábele --|tImprovement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters|g(Poster Abstract) /|rHugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro and Luis Javier García Villalba --|tConcurrency Optimization for NIDS|g(Poster Abstract) /|rJorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro and Luis Javier García Villalba --|tMalware Detection System by Payload Analysis of Network Traffic|g(Poster Abstract) /|rLuis Javier García Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco and Javier Martínez Puentes.
506 1 |aAccess restricted to current Chicago State University students, faculty and staff.
650 0|aComputer networks|xSecurity measures|vCongresses.
650 0|aComputer networks|xAccess control|vCongresses.
650 0|aComputer security|vCongresses.
650 7|aComputer networks|xAccess control.|2fast|0(OCoLC)fst00872298
650 7|aComputer networks|xSecurity measures.|2fast|0(OCoLC)fst00872341
650 7|aComputer security.|2fast|0(OCoLC)fst00872484
653 4|aComputer science.
653 4|aComputer Communication Networks.
653 4|aOperating systems (Computers).
653 4|aData protection.
653 4|aSystems and Data Security.
653 4|aOperating Systems.
653 4|aProgramming Languages, Compilers, Interpreters.
653 4|ae-Commerce/e-business.
653 4|aInformation Systems Applications (incl. Internet).
655 7|aConference proceedings.|2fast|0(OCoLC)fst01423772
655 0|aElectronic books.
700 1 |aBalzarotti, Davide.
700 1 |aStolfo, Salvatore J.|q(Salvatore Joseph)
700 1 |aCova, Marco.
830 0|aLecture notes in computer science ;|v7462.
830 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology.
852 0 |bebook|kCRLICS|hTK5105.59|i.R35 2012eb|t1
856 40|3SpringerLink Computer Science (ebooks)|u|zavailable only to CSU students, faculty and staff. Click here to access.
951 2 |aSpringerLink (Online service)
953 2 |aSpringerLink ebooks.|gComputer Science.|f2012.
959 |a(CSUdb)681626

Staff View for: Research in Attacks, Intrusions, and Def