Detection of intrusions and malware, and vulnerability assessment: 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7967 |
Schlagworte: | |
Online-Zugang: | DE-1050 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XII, 206 S.) graph. Darst. |
ISBN: | 9783642392344 9783642392351 |
DOI: | 10.1007/978-3-642-39235-1 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041417426 | ||
003 | DE-604 | ||
005 | 20180111 | ||
007 | cr|uuu---uuuuu | ||
008 | 131115s2013 xx d||| o|||| 10||| eng d | ||
020 | |a 9783642392344 |c Print |9 978-3-642-39234-4 | ||
020 | |a 9783642392351 |c Online |9 978-3-642-39235-1 | ||
024 | 7 | |a 10.1007/978-3-642-39235-1 |2 doi | |
035 | |a (OCoLC)858014009 | ||
035 | |a (DE-599)BVBBV041417426 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-739 |a DE-859 |a DE-91 |a DE-706 |a DE-384 |a DE-634 |a DE-1050 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Detection of intrusions and malware, and vulnerability assessment |b 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings |c Konrad Rieck ... (Eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XII, 206 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7967 | |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Berlin |2 gnd-content | |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | 2 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 3 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Rieck, Konrad |e Sonstige |0 (DE-588)1045255491 |4 oth | |
711 | 2 | |a DIMVA |n 10 |d 2013 |c Berlin |j Sonstige |0 (DE-588)1038682991 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7967 |w (DE-604)BV014880109 |9 7967 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-39235-1 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026864580 | |
966 | e | |u http://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=3101118 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1820875524583456768 |
---|---|
adam_text |
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
MALWARE
NETWORK SECURITY
WEB SECURITY
ATTACKS AND DEFENSES
HOST SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE REFEREED PROCEEDINGS OF THE 10TH INTERNATIONAL
CONFERENCE ON DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY
ASSESSMENT, DIMVA 2013, HELD IN BERLIN, GERMANY, IN JULY 2013. THE 9
REVISED FULL PAPERS PRESENTED TOGETHER WITH 3 SHORT PAPERS WERE
CAREFULLY REVIEWED AND SELECTED FROM 38 SUBMISSIONS. THE PAPERS ARE
ORGANIZED IN TOPICAL SECTIONS ON MALWARE; NETWORK SECURITY, WEB
SECURITY; ATTACKS AND DEFENSES; AND HOST SECURITY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1045255491 |
building | Verbundindex |
bvnumber | BV041417426 |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 460f DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC ZDB-30-PQE |
ctrlnum | (OCoLC)858014009 (DE-599)BVBBV041417426 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-39235-1 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041417426</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180111</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131115s2013 xx d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642392344</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-642-39234-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642392351</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-39235-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-39235-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858014009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041417426</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of intrusions and malware, and vulnerability assessment</subfield><subfield code="b">10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings</subfield><subfield code="c">Konrad Rieck ... (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 206 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7967</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Berlin</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rieck, Konrad</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1045255491</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">DIMVA</subfield><subfield code="n">10</subfield><subfield code="d">2013</subfield><subfield code="c">Berlin</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1038682991</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7967</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7967</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-39235-1</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026864580</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=3101118</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Berlin gnd-content |
genre_facet | Konferenzschrift 2013 Berlin |
id | DE-604.BV041417426 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:16:59Z |
institution | BVB |
institution_GND | (DE-588)1038682991 |
isbn | 9783642392344 9783642392351 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026864580 |
oclc_num | 858014009 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-739 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-1050 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-739 DE-859 DE-91 DE-BY-TUM DE-706 DE-384 DE-634 DE-1050 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XII, 206 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-30-PQE ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings Konrad Rieck ... (Eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XII, 206 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7967 Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Berlin gnd-content Malware (DE-588)4687059-3 s Eindringerkennung (DE-588)4706627-1 s Softwareschwachstelle (DE-588)4752508-3 s Kryptoanalyse (DE-588)4830502-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Rieck, Konrad Sonstige (DE-588)1045255491 oth DIMVA 10 2013 Berlin Sonstige (DE-588)1038682991 oth Lecture notes in computer science 7967 (DE-604)BV014880109 7967 https://doi.org/10.1007/978-3-642-39235-1 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings Lecture notes in computer science Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4752508-3 (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)4274324-2 (DE-588)4687059-3 (DE-588)1071861417 |
title | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings |
title_auth | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings |
title_exact_search | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings |
title_full | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings Konrad Rieck ... (Eds.) |
title_fullStr | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings Konrad Rieck ... (Eds.) |
title_full_unstemmed | Detection of intrusions and malware, and vulnerability assessment 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings Konrad Rieck ... (Eds.) |
title_short | Detection of intrusions and malware, and vulnerability assessment |
title_sort | detection of intrusions and malware and vulnerability assessment 10th international conference dimva 2013 berlin germany july 18 19 2013 proceedings |
title_sub | 10th international conference, DIMVA 2013, Berlin, Germany, July 18 - 19, 2013 ; proceedings |
topic | Softwareschwachstelle (DE-588)4752508-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd Computersicherheit (DE-588)4274324-2 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Softwareschwachstelle Kryptoanalyse Eindringerkennung Computersicherheit Malware Konferenzschrift 2013 Berlin |
url | https://doi.org/10.1007/978-3-642-39235-1 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026864580&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT rieckkonrad detectionofintrusionsandmalwareandvulnerabilityassessment10thinternationalconferencedimva2013berlingermanyjuly18192013proceedings AT dimvaberlin detectionofintrusionsandmalwareandvulnerabilityassessment10thinternationalconferencedimva2013berlingermanyjuly18192013proceedings |