Detection of intrusions and malware, and vulnerability assessment : 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings /: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings. (2015)
- Record Type:
- Book
- Title:
- Detection of intrusions and malware, and vulnerability assessment : 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings /: 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings. (2015)
- Main Title:
- Detection of intrusions and malware, and vulnerability assessment : 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings
- Other Titles:
- DIMVA 2015
- Further Information:
- Note: Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.).
- Editors:
- Almgren, Magnus
Gulisano, Vincenzo
Maggi, Federico - Other Names:
- DIMVA (Conference), 12th
- Contents:
- Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks.- 'Nice Boots!' - A Large-Scale Analysis of Bootkits and New Ways to Stop Them.- C5: Cross-Cores Cache Covert Channel.- Intrusion Detection for Airborne Communication Using PHY-Layer Information.- That Ain't You: Blocking Spearphishing Through Behavioral Modelling.- Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics.- Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries.- Fine-Grained Control-Flow Integrity Through Binary Hardening.- Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software.- The Role of Cloud Services in Malicious Software: Trends and Insights.- Capturing DDoS Attack Dynamics Behind the Scenes.- Quit Playing Games with My Heart: Understanding Online Dating Scams.- More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.- May I? - Content Security Policy Endorsement for Browser Extensions.- On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users.- Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.- Controlled Data Sharing for Collaborative Predictive Blacklisting.
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2015
- Extent:
- 1 online resource (xii, 351 pages), illustrations
- Subjects:
- 005.8
Computer science
Intrusion detection systems (Computer security) -- Congresses
Computer security -- Congresses
Computer security
Intrusion detection systems (Computer security)
Computer Science
Engineering & Applied Sciences
Computers -- Electronic Commerce
Business & Economics -- Information Management
Business applications
Information architecture
Computer security
Information Systems
Computers -- Security -- General
Computer security
Electronic books
Conference papers and proceedings
Electronic books - Languages:
- English
- ISBNs:
- 9783319205502
3319205501
3319205498
9783319205496 - Related ISBNs:
- 9783319205496
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed June 25, 2015).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.354659
- Ingest File:
- 01_313.xml