|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Davide Balzarotti , Salvatore J. Stolfo , Marco CovaPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2012 ed. Volume: 7462 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.50cm Weight: 0.635kg ISBN: 9783642333378ISBN 10: 3642333370 Pages: 402 Publication Date: 15 August 2012 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsVirtualization.- Trusted VM Snapshots in Untrusted Cloud Infrastructures.- Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection.- Assessing the Trustworthiness of Drivers.- Attacks and Defenses.- Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat.- Memory Errors: The Past, the Present, and the Future.- A Memory Access Validation Scheme against Payload Injection Attacks.- Host and Network Security Dione:A Flexible Disk Monitoring and Analysis Framework.- AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks.- Fraud Detection and Underground Economy.- Paying for Piracy? An Analysis of One-Click Hosters’ Controversial Reward Scheme.- Proactive Discovery of Phishing Related Domain Names.- Evaluating Electricity Theft Detectors in Smart Grid Networks.- Web Security.- PoisonAmplifier:A Guided Approach of Discovering Compromised.- Websites through Reversing Search Poisoning Attacks.- DEMACRO:Defense against Malicious Cross-Domain Requests.- FlashDetect:ActionScript 3 Malware Detection.- Intrusion Detection.- ALERT-ID:Analyze Logs of the Network Element in Real Time for Intrusion Detection.- A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.- GPP-Grep:High-Speed Regular Expression Processing Engine on General Purpose Processors.- N-Gram against the Machine:On the Feasibility of the N-Gram.- Network Analysis for Binary Protocols.- Poster Abstracts.- Online Social Networks, a Criminals Multipurpose Toolbox.- The Triple-Channel Model:Toward Robust and Efficient Advanced Botnets.- Network Security Analysis Method Taking into Account the Usage Information.- Automatic Covert Channel Detection in Asbestos System.- EFA for Efficient Regular Expression Matching in NIDS.- Distress Detection.- Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System.- Towards Automated Forensic Event Reconstructionof Malicious Code.- Accurate Recovery of Functions in a Retargetable Decompiler.- Improvement of an Anagram Based NIDS by Reducing the Storage.- Space of Bloom Filters.- Concurrency Optimization for NIDS.- Malware Detection System by Payload Analysis of Network Traffic.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |