Proceedings of the 3rd European Conference on Computer Network Defense
Corporate Author: | |
---|---|
Other Authors: | , , , |
Format: | eBook |
Language: | English |
Published: |
New York, NY :
Springer US : Imprint: Springer,
2009.
|
Edition: | 1st ed. 2009. |
Series: | Lecture Notes in Electrical Engineering,
30 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-0-387-85555-4 |
Table of Contents:
- Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting
- Towards High Assurance Networks of Virtual Machines
- Intrusion Detection Using Cost-Sensitive Classification
- A Novel Approach for Anomaly Detection over High-Speed Networks
- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption
- Vulnerability Response Decision Assistance
- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests
- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat
- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction
- ISi-LANA - A Secure Basic Architecture for Networks Connected to the Internet.