Detection of intrusions and malware, and vulnerability assessment : 11th international conference, dimva 2014, egham, uk, july 10-11, 2014. Proceedings / edited by Sven Dietrich.
Tipo de material: TextoSeries Lecture Notes in Computer Science ; 8550Editor: Cham : Springer International Publishing : Springer, 2014Descripción: xii, 277 páginas : 90 ilustracionesTipo de contenido:- texto
- computadora
- recurso en línea
- 9783319085098
- QA76.9.A25
Springer eBooks
Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware -- AndRadar: Fast Discovery of Android Applications in Alternative Markets -- Attacks on Android Clipboard.- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.- AV-Meter: An Evaluation of Antivirus Scans and Labels.- PExy: The Other Side of Exploit Kits.- Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.- Parallelization of Network Intrusion Detection Systems under Attack Conditions.- Phoenix: DGA-Based Botnet Tracking and Intelligence -- Quantifiable Run-Time Kernel Attack Surface Reduction.- Bee Master: Detecting Host-Based Code Injection Attacks.- Diagnosis and Emergency Patch Generation for Integer Overflow Exploits.
Para consulta fuera de la UANL se requiere clave de acceso remoto.