Detection of Intrusions and Malware, and Vulnerability Assessment

13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Detection of Intrusions and Malware, and Vulnerability Assessment by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319406671
Publisher: Springer International Publishing Publication: June 17, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319406671
Publisher: Springer International Publishing
Publication: June 17, 2016
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016.

The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016.

The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation. 

More books from Springer International Publishing

Cover of the book Hanes Walton, Jr.: Architect of the Black Science of Politics by
Cover of the book Artificial Ventilation by
Cover of the book Star Ark by
Cover of the book Microstructure and Properties of Ductile Iron and Compacted Graphite Iron Castings by
Cover of the book Sub-Municipal Governance in Europe by
Cover of the book High Speed Rail and Access Transit Networks by
Cover of the book Immunohematology and Transfusion Medicine by
Cover of the book Springer Series in Light Scattering by
Cover of the book Patterns of HCI Design and HCI Design of Patterns by
Cover of the book Gain-Cell Embedded DRAMs for Low-Power VLSI Systems-on-Chip by
Cover of the book Esther in Early Modern Iberia and the Sephardic Diaspora by
Cover of the book Selberg Zeta Functions and Transfer Operators by
Cover of the book Water and Scriptures by
Cover of the book Concise Catalog of Deep-Sky Objects by
Cover of the book Symbolic and Quantitative Approaches to Reasoning with Uncertainty by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy