Advertisement

Table of contents

  1. Front Matter
  2. Network Protection

    1. Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Khayam
      Pages 1-17
    2. Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor
      Pages 18-37
    3. Shad Stafford, Jun Li
      Pages 38-57
  3. High Performance

    1. Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith
      Pages 58-78
    2. Giorgos Vasiliadis, Sotiris Ioannidis
      Pages 79-96
  4. Malware Detection and Defence

    1. Abhinav Srivastava, Jonathon Giffin
      Pages 97-117
    2. Brian M. Bowen, Pratap Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo
      Pages 118-137
    3. Yunjing Xu, Michael Bailey, Eric Vander Weele, Farnam Jahanian
      Pages 138-157
    4. Jiang Wang, Angelos Stavrou, Anup Ghosh
      Pages 158-177
    5. Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jiang
      Pages 178-197
    6. Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo
      Pages 198-217
  5. Evaluation

    1. Charles V. Wright, Christopher Connelly, Timothy Braje, Jesse C. Rabek, Lee M. Rossey, Robert K. Cunningham
      Pages 218-237
    2. Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
      Pages 238-255
    3. Kevin Killourhy, Roy Maxion
      Pages 256-276
  6. Forensics

    1. Lorenzo Martignoni, Aristide Fattori, Roberto Paleari, Lorenzo Cavallaro
      Pages 297-316
    2. Kevin A. Roundy, Barton P. Miller
      Pages 317-338
  7. Anomaly Detection

    1. Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani
      Pages 339-359
    2. Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
      Pages 360-381
    3. Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu Upadhyaya
      Pages 382-401
  8. Web Security

    1. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel
      Pages 422-441
    2. Marco Cova, Corrado Leita, Olivier Thonnard, Angelos D. Keromytis, Marc Dacier
      Pages 442-463
    3. Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
      Pages 464-483
  9. Posters

    1. Mohammed Sqalli, Raed AlShaikh, Ezzat Ahmed
      Pages 486-487
    2. Martin Drašar, Jan Vykopal, Radek Krejčí, Pavel Čeleda
      Pages 488-489
    3. Christian Callegari, Loris Gazzarrini, Stefano Giordano, Michele Pagano, Teresa Pepe
      Pages 490-491
    4. Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
      Pages 492-493
    5. Ying Kong, Yuqing Zhang, Qixu Liu
      Pages 494-495
    6. Yipeng Wang, Zhibin Zhang, Li Guo
      Pages 498-499
    7. Dina Hadžiosmanović, Damiano Bolzoni, Pieter Hartel
      Pages 500-501
    8. Jianchun Jiang, Weifeng Chen, Liping Ding
      Pages 502-504
    9. Robert Koch, Gabi Dreo Rodosek
      Pages 505-507
    10. Salman Niksefat, Mohammad Mahdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari
      Pages 510-511
    11. FuYong Zhang, DeYu Qi, JingLin Hu
      Pages 514-515
  10. Back Matter

About these proceedings

Keywords

Protection access protection artificial intelligence digital biometrics firewall intrusion detection network protection security tar

Editors and affiliations

  • Somesh Jha
    • 1
  • Robin Sommer
    • 2
  • Christian Kreibich
    • 2
  1. 1.Computer Sciences DepartmentUniversity of WisconsinMadisonUSA
  2. 2.International Computer Science InstituteBerkeleyUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-15512-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-15511-6
  • Online ISBN 978-3-642-15512-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site