Proceedings of the 3rd European Conference on Computer Network Defense:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
2009
|
Ausgabe: | 1 |
Schriftenreihe: | Lecture Notes in Electrical Engineering
30 |
Schlagworte: | |
Online-Zugang: | BTU01 FHN01 FHR01 Volltext |
Beschreibung: | Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense |
Beschreibung: | 1 Online-Ressource (X, 166p. 25 illus) |
ISBN: | 9780387855554 |
DOI: | 10.1007/978-0-387-85555-4 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV041889543 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140603s2009 |||| o||u| ||||||eng d | ||
020 | |a 9780387855554 |c Online |9 978-0-387-85555-4 | ||
024 | 7 | |a 10.1007/978-0-387-85555-4 |2 doi | |
035 | |a (OCoLC)881625490 | ||
035 | |a (DE-599)BVBBV041889543 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-634 |a DE-898 |a DE-92 |a DE-83 | ||
082 | 0 | |a 621.382 |2 23 | |
100 | 1 | |a Siris, Vasilios |e Verfasser |4 aut | |
245 | 1 | 0 | |a Proceedings of the 3rd European Conference on Computer Network Defense |c edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios |
250 | |a 1 | ||
264 | 1 | |a Boston, MA |b Springer US |c 2009 | |
300 | |a 1 Online-Ressource (X, 166p. 25 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Lecture Notes in Electrical Engineering |v 30 | |
500 | |a Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense | ||
505 | 0 | |a Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting -- Towards High Assurance Networks of Virtual Machines -- Intrusion Detection Using Cost-Sensitive Classification -- A Novel Approach for Anomaly Detection over High-Speed Networks -- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption -- Vulnerability Response Decision Assistance -- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests -- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat -- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction -- ISi-LANA – A Secure Basic Architecture for Networks Connected to the Internet | |
650 | 4 | |a Engineering | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Computer network architectures | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Information Systems | |
650 | 4 | |a Computer engineering | |
650 | 4 | |a Telecommunication | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Performance and Reliability | |
650 | 4 | |a Electrical Engineering | |
650 | 4 | |a Computer Systems Organization and Communication Networks | |
650 | 4 | |a Ingenieurwissenschaften | |
700 | 1 | |a Anagnostakis, Kostas |e Sonstige |4 oth | |
700 | 1 | |a Ioannidis, Sotiris |e Sonstige |4 oth | |
700 | 1 | |a Trimintzios, Panagiotis |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-387-85554-7 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-0-387-85555-4 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027333496 | ||
966 | e | |u https://doi.org/10.1007/978-0-387-85555-4 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-85555-4 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-0-387-85555-4 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152238454603776 |
---|---|
any_adam_object | |
author | Siris, Vasilios |
author_facet | Siris, Vasilios |
author_role | aut |
author_sort | Siris, Vasilios |
author_variant | v s vs |
building | Verbundindex |
bvnumber | BV041889543 |
collection | ZDB-2-ENG |
contents | Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting -- Towards High Assurance Networks of Virtual Machines -- Intrusion Detection Using Cost-Sensitive Classification -- A Novel Approach for Anomaly Detection over High-Speed Networks -- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption -- Vulnerability Response Decision Assistance -- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests -- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat -- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction -- ISi-LANA – A Secure Basic Architecture for Networks Connected to the Internet |
ctrlnum | (OCoLC)881625490 (DE-599)BVBBV041889543 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-0-387-85555-4 |
edition | 1 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03480nmm a2200589zcb4500</leader><controlfield tag="001">BV041889543</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140603s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387855554</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-387-85555-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-0-387-85555-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881625490</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041889543</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Siris, Vasilios</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the 3rd European Conference on Computer Network Defense</subfield><subfield code="c">edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 166p. 25 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Lecture Notes in Electrical Engineering</subfield><subfield code="v">30</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting -- Towards High Assurance Networks of Virtual Machines -- Intrusion Detection Using Cost-Sensitive Classification -- A Novel Approach for Anomaly Detection over High-Speed Networks -- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption -- Vulnerability Response Decision Assistance -- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests -- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat -- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction -- ISi-LANA – A Secure Basic Architecture for Networks Connected to the Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer network architectures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Performance and Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anagnostakis, Kostas</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ioannidis, Sotiris</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trimintzios, Panagiotis</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-387-85554-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-0-387-85555-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027333496</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-85555-4</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-85555-4</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-0-387-85555-4</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV041889543 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:07:32Z |
institution | BVB |
isbn | 9780387855554 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027333496 |
oclc_num | 881625490 |
open_access_boolean | |
owner | DE-634 DE-898 DE-BY-UBR DE-92 DE-83 |
owner_facet | DE-634 DE-898 DE-BY-UBR DE-92 DE-83 |
physical | 1 Online-Ressource (X, 166p. 25 illus) |
psigel | ZDB-2-ENG |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer US |
record_format | marc |
series2 | Lecture Notes in Electrical Engineering |
spelling | Siris, Vasilios Verfasser aut Proceedings of the 3rd European Conference on Computer Network Defense edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios 1 Boston, MA Springer US 2009 1 Online-Ressource (X, 166p. 25 illus) txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Electrical Engineering 30 Proceedings of the 3rd European Conference on Computer Network Defense compiles revised and extended articles written by prominent researchers participating in the 3rd European Conference on Computer Network Defense (EC2ND). This volume presents information on intrusion detection and privacy protection. The text offers the latest information on advances in network security and serves as an excellent reference work for researchers and graduate students working in the area of computer network defense Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting -- Towards High Assurance Networks of Virtual Machines -- Intrusion Detection Using Cost-Sensitive Classification -- A Novel Approach for Anomaly Detection over High-Speed Networks -- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption -- Vulnerability Response Decision Assistance -- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests -- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat -- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction -- ISi-LANA – A Secure Basic Architecture for Networks Connected to the Internet Engineering Operating systems (Computers) Computer network architectures Computer Communication Networks Information Systems Computer engineering Telecommunication Communications Engineering, Networks Management of Computing and Information Systems Performance and Reliability Electrical Engineering Computer Systems Organization and Communication Networks Ingenieurwissenschaften Anagnostakis, Kostas Sonstige oth Ioannidis, Sotiris Sonstige oth Trimintzios, Panagiotis Sonstige oth Erscheint auch als Druckausgabe 978-0-387-85554-7 https://doi.org/10.1007/978-0-387-85555-4 Verlag Volltext |
spellingShingle | Siris, Vasilios Proceedings of the 3rd European Conference on Computer Network Defense Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting -- Towards High Assurance Networks of Virtual Machines -- Intrusion Detection Using Cost-Sensitive Classification -- A Novel Approach for Anomaly Detection over High-Speed Networks -- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption -- Vulnerability Response Decision Assistance -- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests -- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat -- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction -- ISi-LANA – A Secure Basic Architecture for Networks Connected to the Internet Engineering Operating systems (Computers) Computer network architectures Computer Communication Networks Information Systems Computer engineering Telecommunication Communications Engineering, Networks Management of Computing and Information Systems Performance and Reliability Electrical Engineering Computer Systems Organization and Communication Networks Ingenieurwissenschaften |
title | Proceedings of the 3rd European Conference on Computer Network Defense |
title_auth | Proceedings of the 3rd European Conference on Computer Network Defense |
title_exact_search | Proceedings of the 3rd European Conference on Computer Network Defense |
title_full | Proceedings of the 3rd European Conference on Computer Network Defense edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios |
title_fullStr | Proceedings of the 3rd European Conference on Computer Network Defense edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios |
title_full_unstemmed | Proceedings of the 3rd European Conference on Computer Network Defense edited by Vasilios Siris, Kostas Anagnostakis, Sotiris Ioannidis, Panagiotis Trimintzios |
title_short | Proceedings of the 3rd European Conference on Computer Network Defense |
title_sort | proceedings of the 3rd european conference on computer network defense |
topic | Engineering Operating systems (Computers) Computer network architectures Computer Communication Networks Information Systems Computer engineering Telecommunication Communications Engineering, Networks Management of Computing and Information Systems Performance and Reliability Electrical Engineering Computer Systems Organization and Communication Networks Ingenieurwissenschaften |
topic_facet | Engineering Operating systems (Computers) Computer network architectures Computer Communication Networks Information Systems Computer engineering Telecommunication Communications Engineering, Networks Management of Computing and Information Systems Performance and Reliability Electrical Engineering Computer Systems Organization and Communication Networks Ingenieurwissenschaften |
url | https://doi.org/10.1007/978-0-387-85555-4 |
work_keys_str_mv | AT sirisvasilios proceedingsofthe3rdeuropeanconferenceoncomputernetworkdefense AT anagnostakiskostas proceedingsofthe3rdeuropeanconferenceoncomputernetworkdefense AT ioannidissotiris proceedingsofthe3rdeuropeanconferenceoncomputernetworkdefense AT trimintziospanagiotis proceedingsofthe3rdeuropeanconferenceoncomputernetworkdefense |