|
|
|
|
LEADER |
03266nam a22004455i 4500 |
001 |
000292791 |
005 |
20210923153333.0 |
007 |
cr nn 008mamaa |
008 |
171012s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319663326
|
024 |
7 |
|
|a 10.1007/978-3-319-66332-6
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Research in Attacks, Intrusions, and Defenses :
|b 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings /
|c edited by Marc Dacier, Michael Bailey, Michalis Polychronakis, Manos Antonakakis.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XIII, 496 p. 115 illus. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Security and Cryptology ;
|v 10453
|
505 |
0 |
|
|a VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices -- Static Program Analysis as a Fuzzing Aid -- Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit -- Lens on the endpoint: Hunting for malicious software through endpoint data analysis -- Redemption: Real-time Protection Against Ransomware at End-Hosts -- ILAB: An Interactive Labelling Strategy for Intrusion Detection -- Precisely and Scalably Vetting JavaScript Bridge In Android Hybrid Apps -- Filtering for Malice through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level -- Android Malware Clustering through Malicious Payload Mining -- Stealth Loader: Trace-free Program Loading for API Obfuscation -- LAZARUS: Practical Side-channel Resilient Kernel-Space Randomization -- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers -- Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises -- BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems -- Trapped by the UI: The Android case -- Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults -- Secure In-Cache Execution -- Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage -- Linking Amplification DDoS Attacks to Booter Services -- Practical and Accurate Runtime Application Protection against DoS Attacks -- Exploring the ecosystem of malicious domain registrations in the .eu TLD.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Operating systems (Computers).
|
650 |
1 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Operating Systems.
|
700 |
1 |
|
|a Dacier, Marc.
|e editor.
|
700 |
1 |
|
|a Bailey, Michael.
|e editor.
|
700 |
1 |
|
|a Polychronakis, Michalis.
|e editor.
|
700 |
1 |
|
|a Antonakakis, Manos.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|