Narrow your search

Library

AP (3)

KDG (3)


Resource type

digital (3)


Language

English (3)


Year
From To Submit

2015 (1)

2014 (1)

2011 (1)

Listing 1 - 3 of 3
Sort by

Digital
Detection of Intrusions and Malware, and Vulnerability Assessment : 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings
Authors: ---
ISBN: 9783642224249 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Research in Attacks, Intrusions and Defenses : 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings
Authors: --- ---
ISBN: 9783319113791 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.


Digital
Research in Attacks, Intrusions, and Defenses : 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings
Authors: --- ---
ISBN: 9783319263625 9783319263618 9783319263632 Year: 2015 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.

Listing 1 - 3 of 3
Sort by