Editors:
Unique visibility, state-of-the-art survey,
fast-track conference proceedings
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6201)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): DIMVA: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Conference proceedings info: DIMVA 2010.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, access via your institution.
Table of contents (12 papers)
-
Front Matter
-
Back Matter
Keywords
- Blue Tooth Botnets
- Hacking
- Hacking C
- Hacking Competitions
- Intrusion Detection
- Network Security
- Overlay Networks
- Search Worms
- Skype
- Stripping Attacks
- Web Security
- Web Vulnerability
- security
- algorithm analysis and problem complexity
Editors and Affiliations
-
International Computer Science Institute, Berkeley, USA
Christian Kreibich
-
Research Establishment for Applied Science (FGAN), Research Institute for Communication, Information Processing and Ergonomics (FKIE), Wachtberg, Germany
Marko Jahnke
Bibliographic Information
Book Title: Detection of Intrusions and Malware, and Vulnerability Assessment
Book Subtitle: 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010, Proceedings
Editors: Christian Kreibich, Marko Jahnke
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-14215-4
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2010
Softcover ISBN: 978-3-642-14214-7Published: 07 July 2010
eBook ISBN: 978-3-642-14215-4Published: 04 July 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XII, 219
Number of Illustrations: 55 b/w illustrations
Topics: Computer Communication Networks, Cryptology, Management of Computing and Information Systems, Computers and Society, Information Systems Applications (incl. Internet), Algorithm Analysis and Problem Complexity