Detection of Intrusions and Malware, and Vulnerability Assessment

13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Detection of Intrusions and Malware, and Vulnerability Assessment by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319406671
Publisher: Springer International Publishing Publication: June 17, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319406671
Publisher: Springer International Publishing
Publication: June 17, 2016
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016.

The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016.

The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation. 

More books from Springer International Publishing

Cover of the book Novel Psychoactive Substances by
Cover of the book Diagnosis and Management of Testicular Cancer by
Cover of the book Sustainable Goat Production in Adverse Environments: Volume II by
Cover of the book Late Neoliberalism and its Discontents in the Economic Crisis by
Cover of the book Universities in the Age of Reform, 1800–1870 by
Cover of the book Soft Matter at Aqueous Interfaces by
Cover of the book Investigation into High Efficiency Visible Light Photocatalysts for Water Reduction and Oxidation by
Cover of the book Patient-Derived Mouse Models of Cancer by
Cover of the book Computational Intelligence Methods for Bioinformatics and Biostatistics by
Cover of the book Euro-Par 2018: Parallel Processing by
Cover of the book Describing and Studying Domain-Specific Serious Games by
Cover of the book The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2018) by
Cover of the book Pathogenesis of Periodontal Diseases by
Cover of the book Stiff Extrusion Briquetting in Metallurgy by
Cover of the book Multimedia Data Mining and Analytics by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy