Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proc by Roland BüschkesDetection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006, Proc by Roland Büschkes

Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference…

byRoland BüschkesEditorPavel Laskov

Paperback | June 29, 2006

Pricing and Purchase Info

$106.57 online 
$124.50 list price save 14%
Earn 533 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006.

The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.

Title:Detection of Intrusions and Malware, and Vulnerability Assessment: Third International Conference…Format:PaperbackDimensions:195 pages, 23.5 × 15.5 × 0.07 inPublished:June 29, 2006Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:354036014X

ISBN - 13:9783540360148

Look for similar items by category:

Reviews

Table of Contents

Code Analysis.- Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.- Using Static Program Analysis to Aid Intrusion Detection.- Intrusion Detection.- An SVM-Based Masquerade Detection Method with Online Update Using Co-occurrence Matrix.- Network-Level Polymorphic Shellcode Detection Using Emulation.- Detecting Unknown Network Attacks Using Language Models.- Threat Protection and Response.- Using Labeling to Prevent Cross-Service Attacks Against Smart Phones.- Using Contextual Security Policies for Threat Response.- Malware and Forensics.- Detecting Self-mutating Malware Using Control-Flow Graph Matching.- Digital Forensic Reconstruction and the Virtual Security Testbed ViSe.- Deployment Scenarios.- A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs.- A Fast Worm Scan Detection Tool for VPN Congestion Avoidance.