Cantitate/Preț
Produs

Detection of Intrusions and Malware, and Vulnerability Assessment: Lecture Notes in Computer Science

Editat de Lorenzo Cavallaro, Daniel Gruss, Giancarlo Pellegrino, Giorgio Giacinto
en Limba Engleză Paperback – 25 iun 2022
This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021.
The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions. 
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 45443 lei

Preț vechi: 56804 lei
-20% Nou

Puncte Express: 682

Preț estimativ în valută:
8041 9429$ 7062£

Carte tipărită la comandă

Livrare economică 30 ianuarie-13 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783031094835
ISBN-10: 3031094832
Pagini: 232
Ilustrații: XII, 219 p. 63 illus., 51 illus. in color.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.36 kg
Ediția:1st edition 2022
Editura: Springer
Seria Lecture Notes in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

Hybrid Pruning: Towards A Precise Static Analysis.- Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models.- Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware.- COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.- Prioritizing Antivirus Alerts on Internal Enterprise Machines.- VANDALIR: Vulnerability Analyses based on Datalog and LLVM-IR.- Branch Different - Spectre Attacks on Apple Silicon.- MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys .- A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities.- Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks.- Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.