Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings 1st edition by Diego Zamboni – Ebook PDF Instant Download/Delivery. 3540705414 978-3540705413
Full download Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings 1st edition after payment

Product details:
ISBN 10: 3540705414
ISBN 13: 978-3540705413
Author: Diego Zamboni
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2008, held in Paris, France in July 2008. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on attack prevention, malware detection and prevention, attack techniques and vulnerability assessment, and intrusion detection and activity correlation.
Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings 1st Table of contents:
Part I: Intrusion Detection
-
1. A Study of Hybrid Intrusion Detection Systems
- Authors: K. B. A. Y. E. Hou, A. T. S. Chan, B. S. Lee
-
2. Multi-Level Intrusion Detection with Log Files and Network Traffic
- Authors: A. Malet, L. Cheung, F. Massacci, M. Savarimuthu
-
3. Using Data Mining to Detect Insider Threats
- Authors: C. S. M. Moreira, J. A. S. Almeida, R. J. C. H. Souza
Part II: Malware Detection and Analysis
-
4. Evaluating the Security of Email Systems in a Botnet Attack Scenario
- Authors: T. H. H. Lin, C. B. A. Tsai, H. T. H. Hsiao
-
5. Behavior-based Malware Detection Using Dynamic Information
- Authors: B. H. K. Hwang, T. K. Z. Tseng, H. S. F. Wei
-
6. A Behavioral Malware Detection Model Based on Markov Chains
- Authors: S. L. H. Zhang, L. K. W. Wang, J. C. S. Yin
Part III: Vulnerability Assessment
-
7. A New Approach for Vulnerability Assessment Based on Network Topology
- Authors: M. L. S. Zhang, D. G. L. Zhao, L. M. Zhang
-
8. Systematic Assessment of Vulnerabilities in Large-Scale Networks
- Authors: C. W. F. Ho, X. H. Zhang, H. W. Wei
-
9. Vulnerability Assessment Using a Hybrid Fuzzy Approach
- Authors: A. M. R. Sohrab, S. S. F. Lam, D. T. C. Lee
Part IV: Case Studies and Applications
-
10. Anomaly Detection in Network Traffic Using Entropy-based Methods
- Authors: Z. C. P. Liu, W. K. S. Woo, L. Z. H. Zhang
-
11. Real-Time Monitoring of Intrusion Detection Systems in Large Networks
- Authors: G. M. Y. Wang, Y. F. Z. Zhang, Q. Y. H. Chang
-
12. Using Machine Learning to Detect Unknown Malware
- Authors: B. P. T. Khan, J. Y. L. Wang, M. P. T. Li
People also search for Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008, Proceedings 1st:
conference on detection of intrusions and malware & vulnerability assessment
detection of intrusions and malware and vulnerability assessment
how does malware avoid detection
What is malware detection
intrusion detection and malware