Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2008
Schriftenreihe:Lecture notes in computer science 5137
Schlagworte:
Online-Zugang:DE-634
DE-M347
DE-91
DE-384
DE-473
DE-19
DE-703
DE-706
DE-739
DE-355
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV023411569
003 DE-604
005 20130130
007 cr|uuu---uuuuu
008 080723s2008 xx o|||| 10||| eng d
020 |a 9783540705413  |9 978-3-540-70541-3 
020 |a 9783540705420  |c Online  |9 978-3-540-70542-0 
024 7 |a 10.1007/978-3-540-70542-0  |2 doi 
035 |a (OCoLC)845433656 
035 |a (DE-599)BVBBV023411569 
040 |a DE-604  |b ger 
041 0 |a eng 
049 |a DE-19  |a DE-739  |a DE-473  |a DE-706  |a DE-91  |a DE-384  |a DE-M347  |a DE-703  |a DE-634  |a DE-355 
084 |a DAT 000  |2 stub 
245 1 0 |a Detection of intrusions and malware, and vulnerability assessment  |b 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings  |c Diego Zamboni (ed.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2008 
300 |a 1 Online-Ressource (X, 278 S.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 5137 
650 0 7 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |2 gnd  |9 rswk-swf 
650 0 7 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
650 0 7 |a Malware  |0 (DE-588)4687059-3  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2008  |z Paris  |2 gnd-content 
689 0 0 |a Malware  |0 (DE-588)4687059-3  |D s 
689 0 |5 DE-604 
689 1 0 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 1 |5 DE-604 
689 2 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 2 |5 DE-604 
689 3 0 |a Softwareschwachstelle  |0 (DE-588)4752508-3  |D s 
689 3 |5 DE-604 
689 4 0 |a Zugriffskontrolle  |0 (DE-588)4293034-0  |D s 
689 4 |5 DE-604 
700 1 |a Zamboni, Diego  |e Sonstige  |4 oth 
711 2 |a DIMVA  |n 5  |d 2008  |c Paris  |j Sonstige  |0 (DE-588)10348654-9  |4 oth 
830 0 |a Lecture notes in computer science  |v 5137  |w (DE-604)BV014880109  |9 5137 
856 4 0 |u https://doi.org/10.1007/978-3-540-70542-0  |x Verlag  |3 Volltext 
912 |a ZDB-2-SCS 
943 1 |a oai:aleph.bib-bvb.de:BVB01-016594173 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-91  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-384  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-19  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-706  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-540-70542-0  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 1645106
DE-BY-UBR_katkey 6755522
_version_ 1822711255924736000
adam_text
any_adam_object
building Verbundindex
bvnumber BV023411569
classification_rvk SS 4800
classification_tum DAT 000
collection ZDB-2-SCS
ctrlnum (OCoLC)845433656
(DE-599)BVBBV023411569
discipline Informatik
doi_str_mv 10.1007/978-3-540-70542-0
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV023411569</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130130</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">080723s2008 xx o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540705413</subfield><subfield code="9">978-3-540-70541-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540705420</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-540-70542-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-540-70542-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)845433656</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023411569</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Detection of intrusions and malware, and vulnerability assessment</subfield><subfield code="b">5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings</subfield><subfield code="c">Diego Zamboni (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 278 S.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5137</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Paris</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zamboni, Diego</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">DIMVA</subfield><subfield code="n">5</subfield><subfield code="d">2008</subfield><subfield code="c">Paris</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10348654-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5137</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">5137</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016594173</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-540-70542-0</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2008 Paris gnd-content
genre_facet Konferenzschrift 2008 Paris
id DE-604.BV023411569
illustrated Not Illustrated
indexdate 2025-01-27T13:32:08Z
institution BVB
institution_GND (DE-588)10348654-9
isbn 9783540705413
9783540705420
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-016594173
oclc_num 845433656
open_access_boolean
owner DE-19
DE-BY-UBM
DE-739
DE-473
DE-BY-UBG
DE-706
DE-91
DE-BY-TUM
DE-384
DE-M347
DE-703
DE-634
DE-355
DE-BY-UBR
owner_facet DE-19
DE-BY-UBM
DE-739
DE-473
DE-BY-UBG
DE-706
DE-91
DE-BY-TUM
DE-384
DE-M347
DE-703
DE-634
DE-355
DE-BY-UBR
physical 1 Online-Ressource (X, 278 S.)
psigel ZDB-2-SCS
publishDate 2008
publishDateSearch 2008
publishDateSort 2008
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spellingShingle Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings
Lecture notes in computer science
Zugriffskontrolle (DE-588)4293034-0 gnd
Softwareschwachstelle (DE-588)4752508-3 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Malware (DE-588)4687059-3 gnd
subject_GND (DE-588)4293034-0
(DE-588)4752508-3
(DE-588)4830502-9
(DE-588)4706627-1
(DE-588)4687059-3
(DE-588)1071861417
title Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings
title_auth Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings
title_exact_search Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings
title_full Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings Diego Zamboni (ed.)
title_fullStr Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings Diego Zamboni (ed.)
title_full_unstemmed Detection of intrusions and malware, and vulnerability assessment 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings Diego Zamboni (ed.)
title_short Detection of intrusions and malware, and vulnerability assessment
title_sort detection of intrusions and malware and vulnerability assessment 5th international conference dimva 2008 paris france july 10 11 2008 proceedings
title_sub 5th International Conference, DIMVA 2008, Paris, France, July 10 - 11, 2008 ; proceedings
topic Zugriffskontrolle (DE-588)4293034-0 gnd
Softwareschwachstelle (DE-588)4752508-3 gnd
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
Malware (DE-588)4687059-3 gnd
topic_facet Zugriffskontrolle
Softwareschwachstelle
Kryptoanalyse
Eindringerkennung
Malware
Konferenzschrift 2008 Paris
url https://doi.org/10.1007/978-3-540-70542-0
volume_link (DE-604)BV014880109
work_keys_str_mv AT zambonidiego detectionofintrusionsandmalwareandvulnerabilityassessment5thinternationalconferencedimva2008parisfrancejuly10112008proceedings
AT dimvaparis detectionofintrusionsandmalwareandvulnerabilityassessment5thinternationalconferencedimva2008parisfrancejuly10112008proceedings