Proceedings of the 3rd European Conference on Computer Network Defense
Autor Corporativo: | |
---|---|
Otros Autores: | , , , |
Formato: | eBook |
Lenguaje: | English |
Publicado: |
New York, NY :
Springer US : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Lecture Notes in Electrical Engineering,
30 |
Materias: | |
Acceso en línea: | https://doi.org/10.1007/978-0-387-85555-4 |
Tabla de Contenidos:
- Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting
- Towards High Assurance Networks of Virtual Machines
- Intrusion Detection Using Cost-Sensitive Classification
- A Novel Approach for Anomaly Detection over High-Speed Networks
- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption
- Vulnerability Response Decision Assistance
- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests
- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat
- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction
- ISi-LANA – A Secure Basic Architecture for Networks Connected to the Internet.