Detection of intrusions and malware, and vulnerability assessment: 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7591 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (X, 241 S.) graph. Darst. |
ISBN: | 9783642372995 9783642373008 |
DOI: | 10.1007/978-3-642-37300-8 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041388516 | ||
003 | DE-604 | ||
005 | 20140214 | ||
007 | cr|uuu---uuuuu | ||
008 | 131029s2013 xx d||| o|||| 10||| eng d | ||
020 | |a 9783642372995 |9 978-3-642-37299-5 | ||
020 | |a 9783642373008 |c eISBN |9 978-3-642-37300-8 | ||
024 | 7 | |a 10.1007/978-3-642-37300-8 |2 doi | |
035 | |a (OCoLC)874373438 | ||
035 | |a (DE-599)BVBBV041388516 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-739 |a DE-859 |a DE-91 |a DE-706 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Detection of intrusions and malware, and vulnerability assessment |b 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers |c Ulrich Flegel ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (X, 241 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7591 | |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mobiles Endgerät |0 (DE-588)7689895-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 2 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 5 | |a Mobiles Endgerät |0 (DE-588)7689895-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Flegel, Ulrich |e Sonstige |4 oth | |
711 | 2 | |a DIMVA |n 9 |d 2012 |c Heraklion |j Sonstige |0 (DE-588)1033451290 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7591 |w (DE-604)BV014880109 |9 7591 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-37300-8 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026836357 |
Datensatz im Suchindex
_version_ | 1820875483522269184 |
---|---|
adam_text |
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
USING FILE RELATIONSHIPS IN MALWARE
UNDERSTANDING DMA MALWARE
LARGE-SCALE ANALYSIS OF MALWARE DOWNLOADERS
JUXTAPP: A SCALABLE SYSTEM FOR DETECTING CODE REUSE AMONG ANDROID
APPLICATIONS
ADAM: AN AUTOMATIC AND EXTENSIBLE PLATFORM TO STRESS TEST ANDROID
ANTI-VIRUS SYSTEMS
A STATIC, PACKER-AGNOSTIC FILTER TO DETECT SIMILAR MALWARE SAMPLES
EXPERIMENTS WITH MALWARE VISUALIZATION
TRACKING MEMORY WRITES FOR MALWARE CLASSIFICATION AND CODE REUSE
IDENTIFICATION
SYSTEM-LEVEL SUPPORT FOR INTRUSION RECOVERY
NETGATOR: MALWARE DETECTION USING PROGRAM INTERACTIVE CHALLENGES
SMARTPROXY: SECURE SMARTPHONE-ASSISTED LOGINON COMPROMISED MACHINES
BISSAM: AUTOMATIC VULNERABILITY IDENTIFICATION OF OFFICE DOCUMENTS
SELF-ORGANIZED COLLABORATION OF DISTRIBUTED IDS SENSORS
SHEDDING LIGHT ON LOG CORRELATION IN NETWORK FORENSICS ANALYSIS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED POST-PROCEEDINGS OF THE 9TH
INTERNATIONAL CONFERENCE ON DETECTION OF INTRUSIONS AND MALWARE, AND
VULNERABILITY ASSESSMENT, DIMVA 2012, HELD IN HERAKLION, CRETE, GREECE,
IN JULY 2012. THE 10 REVISED FULL PAPERS PRESENTED TOGETHER WITH 4 SHORT
PAPERS WERE CAREFULLY REVIEWED AND SELECTED FROM 44 SUBMISSIONS. THE
PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON MALWARE, MOBILE SECURITY,
SECURE DESIGN, AND INTRUSION DETECTION SYSTEMS (IDS)
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041388516 |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)874373438 (DE-599)BVBBV041388516 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-37300-8 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041388516</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140214</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131029s2013 xx d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642372995</subfield><subfield code="9">978-3-642-37299-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642373008</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-37300-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-37300-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874373438</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041388516</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of intrusions and malware, and vulnerability assessment</subfield><subfield code="b">9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers</subfield><subfield code="c">Ulrich Flegel ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 241 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7591</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mobiles Endgerät</subfield><subfield code="0">(DE-588)7689895-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Mobiles Endgerät</subfield><subfield code="0">(DE-588)7689895-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Flegel, Ulrich</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">DIMVA</subfield><subfield code="n">9</subfield><subfield code="d">2012</subfield><subfield code="c">Heraklion</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1033451290</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7591</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7591</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-37300-8</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026836357</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV041388516 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:21Z |
institution | BVB |
institution_GND | (DE-588)1033451290 |
isbn | 9783642372995 9783642373008 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026836357 |
oclc_num | 874373438 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-739 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-739 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (X, 241 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers Ulrich Flegel ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (X, 241 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7591 Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Mobiles Endgerät (DE-588)7689895-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Malware (DE-588)4687059-3 s Eindringerkennung (DE-588)4706627-1 s Softwareschwachstelle (DE-588)4752508-3 s Kryptoanalyse (DE-588)4830502-9 s Computersicherheit (DE-588)4274324-2 s Mobiles Endgerät (DE-588)7689895-7 s DE-604 Flegel, Ulrich Sonstige oth DIMVA 9 2012 Heraklion Sonstige (DE-588)1033451290 oth Lecture notes in computer science 7591 (DE-604)BV014880109 7591 https://doi.org/10.1007/978-3-642-37300-8 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers Lecture notes in computer science Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Mobiles Endgerät (DE-588)7689895-7 gnd |
subject_GND | (DE-588)4752508-3 (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)4274324-2 (DE-588)4687059-3 (DE-588)7689895-7 (DE-588)1071861417 |
title | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers |
title_auth | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers |
title_exact_search | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers |
title_full | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers Ulrich Flegel ... (eds.) |
title_fullStr | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers Ulrich Flegel ... (eds.) |
title_full_unstemmed | Detection of intrusions and malware, and vulnerability assessment 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers Ulrich Flegel ... (eds.) |
title_short | Detection of intrusions and malware, and vulnerability assessment |
title_sort | detection of intrusions and malware and vulnerability assessment 9th international conference dimva 2012 heraklion crete greece july 26 27 2012 revised selected papers |
title_sub | 9th international conference, DIMVA 2012, Heraklion, Crete, Greece, July 26 - 27, 2012 ; revised selected papers |
topic | Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd Mobiles Endgerät (DE-588)7689895-7 gnd |
topic_facet | Softwareschwachstelle Kryptoanalyse Eindringerkennung Computersicherheit Malware Mobiles Endgerät Konferenzschrift |
url | https://doi.org/10.1007/978-3-642-37300-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026836357&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT flegelulrich detectionofintrusionsandmalwareandvulnerabilityassessment9thinternationalconferencedimva2012heraklioncretegreecejuly26272012revisedselectedpapers AT dimvaheraklion detectionofintrusionsandmalwareandvulnerabilityassessment9thinternationalconferencedimva2012heraklioncretegreecejuly26272012revisedselectedpapers |