Atjaunināt sīkdatņu piekrišanu

Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 2426, 2020, Proceedings 1st ed. 2020 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 281 pages, height x width: 235x155 mm, weight: 456 g, 60 Illustrations, color; 174 Illustrations, black and white; XII, 281 p. 234 illus., 60 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12223
  • Izdošanas datums: 04-Jul-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030526828
  • ISBN-13: 9783030526825
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 281 pages, height x width: 235x155 mm, weight: 456 g, 60 Illustrations, color; 174 Illustrations, black and white; XII, 281 p. 234 illus., 60 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 12223
  • Izdošanas datums: 04-Jul-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030526828
  • ISBN-13: 9783030526825
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.*





The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment.





*The conference was held virtually due to the COVID-19 pandemic.
Vulnerability Discovery and Analysis.- Automated CPE labeling of CVE
summaries with Machine Learning.- Backstabber's Knife Collection: A Review of
Open Source Software Supply Chain Attacks.- Putting Attacks in Context: A
Building Automation Testbed for Impact Assessment from the Victims
Perspective.- Attacks.- Fast and Furious: Outrunning Windows Kernel
Notification Routines from User-Mode.- HAEPG: An Automatic Multi-hop
Exploitation Generation Framework.- Understanding Android VoIP Security: A
System-level Vulnerability Assessment.- Web Security.- Web Runner 2049:
Evaluating Third-Party Anti-bot Services.- Short Paper - Taming The Shape
Shifter: Detecting Anti-fingerprinting Browsers.- It Never Rains but It
Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites.-
On the Security of Application Installers & Online Software Repositories.-
Detection and Containment.- Distributed Heterogeneous N-Variant Execution.-
Sec2graph:Network Attack Detection based on Novelty Detection on Graph
Structured Data.- Efficient Context-Sensitive CFI Enforcement through a
Hardware Monitor.