Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2009
Schriftenreihe:Lecture Notes in Computer Science 5758
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV035740278
003 DE-604
005 20100915
007 t|
008 090924s2009 xx d||| |||| 10||| eng d
015 |a 09,N36,0077  |2 dnb 
016 7 |a 995948003  |2 DE-101 
020 |a 9783642043413  |c PB. : EUR 57.78 (freier Pr.), sfr 84.00 (freier Pr.)  |9 978-3-642-04341-3 
020 |a 3642043410  |9 3-642-04341-0 
024 3 |a 9783642043413 
028 5 2 |a 12752768 
035 |a (OCoLC)436030817 
035 |a (DE-599)DNB995948003 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-706  |a DE-91G  |a DE-83  |a DE-11 
050 0 |a QA76.9.A25 
082 0 |a 005.8 
084 |a DAT 055f  |2 stub 
084 |a 004  |2 sdnb 
084 |a DAT 460f  |2 stub 
245 1 0 |a Recent advances in intrusion detection  |b 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings  |c Engin Kirda ... (eds.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2009 
300 |a XIII, 384 S.  |b graph. Darst.  |c 235 mm x 155 mm 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 5758 
650 4 |a Eindringerkennung - Kongress - Saint-Malo <2009> 
650 4 |a Kryptoanalyse - Kongress - Saint-Malo <2009> 
650 4 |a Computer security  |v Congresses 
650 4 |a Computers  |x Access control  |v Congresses 
650 0 7 |a Kryptoanalyse  |0 (DE-588)4830502-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Eindringerkennung  |0 (DE-588)4706627-1  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2009  |z Saint-Malo  |2 gnd-content 
689 0 0 |a Eindringerkennung  |0 (DE-588)4706627-1  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptoanalyse  |0 (DE-588)4830502-9  |D s 
689 1 |5 DE-604 
700 1 |a Kirda, Engin  |e Sonstige  |0 (DE-588)136202209  |4 oth 
711 2 |a RAID  |n 12  |d 2009  |c Saint-Malo  |j Sonstige  |0 (DE-588)6102619-0  |4 oth 
830 0 |a Lecture Notes in Computer Science  |v 5758  |w (DE-604)BV000000607  |9 5758 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018016703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-018016703 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1709123
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040010159554
_version_ 1822409180011560960
adam_text IMAGE 1 TABLE OF CONTENTS RECENT ADVANCES IN INTRUSION DETECTION ANOMALY AND SPECIFICATION-BASED APPROACHES PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS 1 DAMIANO BOLZONI, SANDRO ETALLE, AND PIETER H. HARTEL PROTECTING A MOVING TARGET: ADDRESSING WEB APPLICATION CONCEPT DRIFT 21 FEDERICO MAGGI, WILLIAM ROBERTSON, CHRISTOPHER KRUEGEL, AND GIOVANNI VIGNA ADAPTIVE ANOMALY DETECTION VIA SELF-CALIBRATION AND DYNAMIC UPDATING 41 GABRIELA F. CRETU-CIOCARLIE, ANGELOS STAVROU, MICHAEL E. LOCASTO, AND SALVATORE J. STOLFO RUNTIME MONITORING AND DYNAMIC RECONFIGURATION FOR INTRUSION DETECTION SYSTEMS 61 MARTIN REHAK, EUGEN STAAB, VOLKER FUSENIG, MICHAL PECHOUCEK, MARTIN GRILL, JAN STIBOREK, KAREL BARIOS, AND THOMAS ENGEL MALWARE DETECTION AND PREVENTION (I) MALWARE BEHAVIORAL DETECTION BY ATTRIBUTE-AUTOMATA USING ABSTRACTION FROM PLATFORM AND LANGUAGE 81 GREGOIRE JACOB, HERVE DEBAR, AND ERIC FILIOL AUTOMATIC GENERATION OF STRING SIGNATURES FOR MALWARE DETECTION 101 KENT GRIFFIN, SCOTT SCHNEIDER, XIN HU, AND TZI-CKER CHIUEH PE-MINER: MINING STRUCTURAL INFORMATION TO DETECT MALICIOUS EXECUTABLES IN REALTIME 121 M. ZUBAIR SHAFIQ, S. MOMINA TABISH, FAUZAN MIRZA, AND MUDDASSAR FAROOQ NETWORK AND HOST INTRUSION DETECTION AND PREVENTION AUTOMATICALLY ADAPTING A TRAINED ANOMALY DETECTOR TO SOFTWARE PATCHES 142 PENG LI, DEBIN GAO, AND MICHAEL K. REITER TOWARDS GENERATING HIGH COVERAGE VULNERABILITY-BASED SIGNATURES WITH PROTOCOL-LEVEL CONSTRAINT-GUIDED EXPLORATION 161 JUAN CABALLERO, ZHENKAI LIANG, PONGSIN POOSANKAM, AND DAWN SONG BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/995948003 DIGITALISIERT DURCH IMAGE 2 XII TABLE OF CONTENTS AUTOMATED BEHAVIORAL FINGERPRINTING 182 JEROME FRANCOIS, HUMBERTO ABDELNUR, RADU STATE, AND OLIVIER FESTOR INTRUSION DETECTION FOR MOBILE DEVICES SMS-WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY DETECTION 202 GUANHUA YAN, STEPHAN EIDENBENZ, AND EMANUELE GALLI KEYSTROKE-BASED USER IDENTIFICATION ON SMART PHONES 224 SAIRA ZAHID, MUHAMMAD SHAHZAD, SYED AH KHAYAM, AND MUDDASSAR FAROOQ VIRUSMETER: PREVENTING YOUR CELLPHONE FROM SPIES 244 LEI LIU, GUANHUA YAN, XINWEN ZHANG, AND SONGQING CHEN HIGH-PERFORMANCE INTRUSION DETECTION REGULAR EXPRESSION MATCHING ON GRAPHICS HARDWARE FOR INTRUSION DETECTION 265 GIORGOS VASILIADIS, MICHAIIS POLYCHRONAKIS, SPIROS ANTONATOS, EVANGELOS P. MARKATOS, AND SOTIRIS IOANNIDIS MULTI-BYTE REGULAR EXPRESSION MATCHING WITH SPECULATION 284 DANIEL LUCHAUP, RANDY SMITH, CRISTIAN ESTAN, AND SOMESH JHA MALWARE DETECTION AND PREVENTION (II) TOWARD REVEALING KERNEL MALWARE BEHAVIOR IN VIRTUAL EXECUTION ENVIRONMENTS 304 CHAOTING XUAN, JOHN COPELAND, AND RAHEEM BEYAH EXPLOITING TEMPORAL PERSISTENCE TO DETECT COVERT BOTNET CHANNELS . . . 326 FREDERIC GIROIRE, JAIDEEP CHANDRASHEKAR, NINA TAFT, EVE SCHOOLER, AND DINA PAPAGIANNAKI POSTERS AN EXPERIMENTAL STUDY ON INSTANCE SELECTION SCHEMES FOR EFFICIENT NETWORK ANOMALY DETECTION 346 YANG LI, LI GUO, BIN-XING FANG, XIANG-TAO LIU, AND LIN-QI AUTOMATIC SOFTWARE INSTRUMENTATION FOR THE DETECTION OF NON-CONTROL-DATA ATTACKS ._ 348 JONATHAN-CHRISTO F ER DEMAY, ERIC TOTEL, AND FREDERIC TRONEL IMAGE 3 TABLE OF CONTENTS XIII BLADE: SLASHING THE INVISIBLE CHANNEL OF DRIVE-BY DOWNLOAD MALWARE 350 LONG LU, VINOD YEGNESWARAN, PHILLIP PORRAS, AND WENKE LEE CERN INVESTIGATION OF NETWORK BEHAVIOUR AND ANOMALY DETECTION . . . 353 MILOSZ MARIAN HULBOJ AND RYSZARD ERAZM JURGA BLARE TOOLS: A POLICY-BASED INTRUSION DETECTION SYSTEM AUTOMATICALLY SET BY THE SECURITY POLICY 355 LAURENT GEORGE, VALERIE VIET TRIEM TONG, AND LUDOVIC ME DETECTION, ALERT AND RESPONSE TO MALICIOUS BEHAVIOR IN MOBILE DEVICES: KNOWLEDGE-BASED APPROACH 357 ASA} SHABTAI, URI KANONOV, AND YUVAL ELOVICI AUTONOMIE INTRUSION DETECTION SYSTEM 359 WEI WANG, THOMAS GUYET, AND SVEIN J. KNAPSKOG ALICE@HOME: DISTRIBUTED FRAMEWORK FOR DETECTING MALICIOUS S I T E S . . . 362 IKPEME ERETE, VINOD YEGNESWARAN, AND PHILLIP PORRAS PACKET SPACE ANALYSIS OF INTRUSION DETECTION SIGNATURES 365 FREDERIC MASSICOTTE TRAFFIC BEHAVIOUR CHARACTERIZATION USING NETMATE 367 ANNIE DE MONTIGNY-LEBOEUF, MATHIEU COUTURE, AND FREDERIC MASSICOTTE ON THE INEFFICIENT USE OF ENTROPY FOR ANOMALY DETECTION 369 MOBIN JAVED, AYESHA BINTE ASHFAQ, M. ZUBAIR SHAFIQ, AND SYED ALI KHAYAM BROWSER-BASED INTRUSION PREVENTION SYSTEM 371 IKPEME ERETE USING FORMAL GRAMMAR AND GENETIC OPERATORS TO EVOLVE MALWARE 374 SADIA NOREEN, SHAFAQ MURTAZA, M. ZUBAIR SHAFIQ, AND MUDDASSAR FAROOQ METHOD FOR DETECTING UNKNOWN MALICIOUS EXECUTABLES 376 BORIS ROZENBERG, EHUD GUDES, YUVAL ELOVICI, AND YUVAL FIEDEL BRAVE NEW WORLD: PERVASIVE INSECURITY OF EMBEDDED NETWORK DEVICES 378 ANG CUI, YINGBO SONG, PRATAP V. PRABHU, AND SALVATORE J. STOLFO DAEDALUS: NOVEL APPLICATION OF LARGE-SCALE DARKNET MONITORING FOR PRACTICAL PROTECTION OF LIVE NETWORKS (EXTENDED ABSTRACT) 381 DAISUKE INOUE, MIO SUZUKI, MASASHI ETO, KATSUNARI YOSHIOKA, AND KOJI NAKAO AUTHOR INDEX 383
any_adam_object 1
author_GND (DE-588)136202209
building Verbundindex
bvnumber BV035740278
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
classification_rvk SS 4800
classification_tum DAT 055f
DAT 460f
ctrlnum (OCoLC)436030817
(DE-599)DNB995948003
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035740278</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100915</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090924s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N36,0077</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">995948003</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642043413</subfield><subfield code="c">PB. : EUR 57.78 (freier Pr.), sfr 84.00 (freier Pr.)</subfield><subfield code="9">978-3-642-04341-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642043410</subfield><subfield code="9">3-642-04341-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642043413</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12752768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)436030817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB995948003</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Recent advances in intrusion detection</subfield><subfield code="b">12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings</subfield><subfield code="c">Engin Kirda ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 384 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5758</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Eindringerkennung - Kongress - Saint-Malo &lt;2009&gt;</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - Saint-Malo &lt;2009&gt;</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Saint-Malo</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kirda, Engin</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)136202209</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">RAID</subfield><subfield code="n">12</subfield><subfield code="d">2009</subfield><subfield code="c">Saint-Malo</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)6102619-0</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5758</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5758</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=018016703&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018016703</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2009 Saint-Malo gnd-content
genre_facet Konferenzschrift 2009 Saint-Malo
id DE-604.BV035740278
illustrated Illustrated
indexdate 2025-01-27T13:33:48Z
institution BVB
institution_GND (DE-588)6102619-0
isbn 9783642043413
3642043410
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-018016703
oclc_num 436030817
open_access_boolean
owner DE-706
DE-91G
DE-BY-TUM
DE-83
DE-11
owner_facet DE-706
DE-91G
DE-BY-TUM
DE-83
DE-11
physical XIII, 384 S. graph. Darst. 235 mm x 155 mm
publishDate 2009
publishDateSearch 2009
publishDateSort 2009
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spelling Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.)
Berlin [u.a.] Springer 2009
XIII, 384 S. graph. Darst. 235 mm x 155 mm
txt rdacontent
n rdamedia
nc rdacarrier
Lecture Notes in Computer Science 5758
Eindringerkennung - Kongress - Saint-Malo <2009>
Kryptoanalyse - Kongress - Saint-Malo <2009>
Computer security Congresses
Computers Access control Congresses
Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf
Eindringerkennung (DE-588)4706627-1 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift 2009 Saint-Malo gnd-content
Eindringerkennung (DE-588)4706627-1 s
DE-604
Kryptoanalyse (DE-588)4830502-9 s
Kirda, Engin Sonstige (DE-588)136202209 oth
RAID 12 2009 Saint-Malo Sonstige (DE-588)6102619-0 oth
Lecture Notes in Computer Science 5758 (DE-604)BV000000607 5758
DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018016703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis
spellingShingle Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings
Lecture Notes in Computer Science
Eindringerkennung - Kongress - Saint-Malo <2009>
Kryptoanalyse - Kongress - Saint-Malo <2009>
Computer security Congresses
Computers Access control Congresses
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
subject_GND (DE-588)4830502-9
(DE-588)4706627-1
(DE-588)1071861417
title Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings
title_auth Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings
title_exact_search Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings
title_full Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.)
title_fullStr Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.)
title_full_unstemmed Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.)
title_short Recent advances in intrusion detection
title_sort recent advances in intrusion detection 12th international symposium raid 2009 saint malo france september 23 25 2009 proceedings
title_sub 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings
topic Eindringerkennung - Kongress - Saint-Malo <2009>
Kryptoanalyse - Kongress - Saint-Malo <2009>
Computer security Congresses
Computers Access control Congresses
Kryptoanalyse (DE-588)4830502-9 gnd
Eindringerkennung (DE-588)4706627-1 gnd
topic_facet Eindringerkennung - Kongress - Saint-Malo <2009>
Kryptoanalyse - Kongress - Saint-Malo <2009>
Computer security Congresses
Computers Access control Congresses
Kryptoanalyse
Eindringerkennung
Konferenzschrift 2009 Saint-Malo
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018016703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT kirdaengin recentadvancesinintrusiondetection12thinternationalsymposiumraid2009saintmalofranceseptember23252009proceedings
AT raidsaintmalo recentadvancesinintrusiondetection12thinternationalsymposiumraid2009saintmalofranceseptember23252009proceedings