Detection of intrusions and malware, and vulnerability assessment: 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6201 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | XII, 218 S. graph. Darst. |
ISBN: | 3642142141 9783642142147 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036601595 | ||
003 | DE-604 | ||
005 | 20100827 | ||
007 | t| | ||
008 | 100805s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10N23 |2 dnb | ||
016 | 7 | |a 1003136621 |2 DE-101 | |
020 | |a 3642142141 |c PB. : ca. EUR 49.22 (freier Pr.), ca. sfr 71.50 (freier Pr.) |9 3-642-14214-1 | ||
020 | |a 9783642142147 |c PB. : ca. EUR 49.22 (freier Pr.), ca. sfr 71.50 (freier Pr.) |9 978-3-642-14214-7 | ||
035 | |a (OCoLC)658322259 | ||
035 | |a (DE-599)DNB1003136621 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-11 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a DAT 055f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
245 | 1 | 0 | |a Detection of intrusions and malware, and vulnerability assessment |b 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings |c Christian Kreibich ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XII, 218 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6201 | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Bonn |2 gnd-content | |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Kreibich, Christian |e Sonstige |4 oth | |
711 | 2 | |a DIMVA |n 7 |d 2010 |c Bonn |j Sonstige |0 (DE-588)16073762-X |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6201 |w (DE-604)BV000000607 |9 6201 | |
856 | 4 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3487316&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020522084&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020522084 |
Datensatz im Suchindex
_version_ | 1820875248953720832 |
---|---|
adam_text |
TABLE OF CONTENTS HOST SECURITY HOOKSCOUT: PROACTIVE BINARY-CENTRIC HOOK
DETECTION 1 HENG YIN, PONGSIN POOSANKAM, STEVE HANNA, AND DAWN SONG
CONQUEROR: TAMPER-PROOF CODE EXECUTION ON LEGACY SYSTEMS 21 LORENZO
MARTIGNONI, ROBERTO PALEAN, AND DANILO BRUSCHI DANUBIS - DYNAMIC DEVICE
DRIVER ANALYSIS BASED ON VIRTUAL MACHINE INTROSPECTION 41 MATTHIAS
NEUGSCHWANDTNER, CHRISTIAN PLATZER, PAOLO MILANI COMPARETTI, AND ULRICH
BAYER TRENDS EVALUATING BLUETOOTH AS A MEDIUM FOR BOTNET COMMAND AND
CONTROL 61 KAPIL SINGH, SAMRIT SANGAL, NEHIL JAIN, PATRICK TRAYNOR, AND
WENKE LEE TAKE A DEEP BREATH: A STEALTHY, RESILIENT AND COST-EFFECTIVE
BOTNET USING SKYPE 81 ANTONIO NAPPA, ARISTIDE FATTORI, MARCO BALDUZZI,
MATTEO DELL'AMICO, AND LORENZO CAVALLARO COVERTLY PROBING UNDERGROUND
ECONOMY MARKETPLACES 101 HANNO FALLMANN, GILBERT WONDRACEK, AND
CHRISTIAN PLATZER VULNERABILITIES WHY JOHNNY CAN'T PENTEST: AN ANALYSIS
OF BLACK-BOX WEB VULNERABILITY SCANNERS ILL ADAM DOUPE, MARCO COVA, AND
GIOVANNI VIGNA ORGANIZING LARGE SCALE HACKING COMPETITIONS 132 NICHOLAS
CHILDERS, BRYCE BOE, LORENZO CAVALLARO, LUDOVICO CAVEDON, MARCO COVA,
MANUEL EGELE, AND GIOVANNI VIGNA INTRUSION DETECTION AN ONLINE ADAPTIVE
APPROACH TO ALERT CORRELATION 153 HANLI BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/1003136621 DIGITALISIERT DURCH XII TABLE OF CONTENTS
KIDS - KEYED INTRUSION DETECTION SYSTEM 173 SASA MRDOVIC AND BRANISLAVA
DRAZENOVIC WEB SECURITY MODELING AND CONTAINMENT OF SEARCH WORMS
TARGETING WEB APPLICATIONS 183 JINGYU HUA AND KOUICHI SAKURAI HPROXY:
CLIENT-SIDE DETECTION OF SSL STRIPPING ATTACKS 200 NICK NIKIFORAKIS,
YVES YOUNAN, AND WOUTER JOOSEN AUTHOR INDEX 219 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV036601595 |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 460f |
ctrlnum | (OCoLC)658322259 (DE-599)DNB1003136621 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036601595</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100827</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100805s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10N23</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1003136621</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642142141</subfield><subfield code="c">PB. : ca. EUR 49.22 (freier Pr.), ca. sfr 71.50 (freier Pr.)</subfield><subfield code="9">3-642-14214-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642142147</subfield><subfield code="c">PB. : ca. EUR 49.22 (freier Pr.), ca. sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-14214-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)658322259</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1003136621</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of intrusions and malware, and vulnerability assessment</subfield><subfield code="b">7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings</subfield><subfield code="c">Christian Kreibich ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 218 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6201</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Bonn</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kreibich, Christian</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">DIMVA</subfield><subfield code="n">7</subfield><subfield code="d">2010</subfield><subfield code="c">Bonn</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16073762-X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6201</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6201</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3487316&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020522084&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020522084</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Bonn gnd-content |
genre_facet | Konferenzschrift 2010 Bonn |
id | DE-604.BV036601595 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:12:37Z |
institution | BVB |
institution_GND | (DE-588)16073762-X |
isbn | 3642142141 9783642142147 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020522084 |
oclc_num | 658322259 |
open_access_boolean | |
owner | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-11 DE-91G DE-BY-TUM DE-83 |
physical | XII, 218 S. graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings Christian Kreibich ... (eds.) Berlin [u.a.] Springer 2010 XII, 218 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6201 Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Bonn gnd-content Malware (DE-588)4687059-3 s DE-604 Eindringerkennung (DE-588)4706627-1 s Kryptoanalyse (DE-588)4830502-9 s Softwareschwachstelle (DE-588)4752508-3 s Zugriffskontrolle (DE-588)4293034-0 s Kreibich, Christian Sonstige oth DIMVA 7 2010 Bonn Sonstige (DE-588)16073762-X oth Lecture notes in computer science 6201 (DE-604)BV000000607 6201 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3487316&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020522084&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings Lecture notes in computer science Zugriffskontrolle (DE-588)4293034-0 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4752508-3 (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)4687059-3 (DE-588)1071861417 |
title | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings |
title_auth | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings |
title_exact_search | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings |
title_full | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings Christian Kreibich ... (eds.) |
title_fullStr | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings Christian Kreibich ... (eds.) |
title_full_unstemmed | Detection of intrusions and malware, and vulnerability assessment 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings Christian Kreibich ... (eds.) |
title_short | Detection of intrusions and malware, and vulnerability assessment |
title_sort | detection of intrusions and malware and vulnerability assessment 7th international conference dimva 2010 bonn germany july 8 9 2010 proceedings |
title_sub | 7th international conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010 ; proceedings |
topic | Zugriffskontrolle (DE-588)4293034-0 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Zugriffskontrolle Softwareschwachstelle Kryptoanalyse Eindringerkennung Malware Konferenzschrift 2010 Bonn |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3487316&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020522084&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kreibichchristian detectionofintrusionsandmalwareandvulnerabilityassessment7thinternationalconferencedimva2010bonngermanyjuly892010proceedings AT dimvabonn detectionofintrusionsandmalwareandvulnerabilityassessment7thinternationalconferencedimva2010bonngermanyjuly892010proceedings |