7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings
Buch, Englisch, 219 Seiten, Gewicht: 358 g
Reihe: Security and Cryptology
ISBN: 978-3-642-14214-7
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik Technische Informatik Wartung & Reparatur
Weitere Infos & Material
Host Security.- HookScout: Proactive Binary-Centric Hook Detection.- Conqueror: Tamper-Proof Code Execution on Legacy Systems.- dAnubis – Dynamic Device Driver Analysis Based on Virtual Machine Introspection.- Trends.- Evaluating Bluetooth as a Medium for Botnet Command and Control.- Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.- Covertly Probing Underground Economy Marketplaces.- Vulnerabilities.- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners.- Organizing Large Scale Hacking Competitions.- Intrusion Detection.- An Online Adaptive Approach to Alert Correlation.- KIDS – Keyed Intrusion Detection System.- Web Security.- Modeling and Containment of Search Worms Targeting Web Applications.- HProxy: Client-Side Detection of SSL Stripping Attacks.