Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture Notes in Computer Science
5758 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035740278 | ||
003 | DE-604 | ||
005 | 20100915 | ||
007 | t| | ||
008 | 090924s2009 xx d||| |||| 10||| eng d | ||
015 | |a 09,N36,0077 |2 dnb | ||
016 | 7 | |a 995948003 |2 DE-101 | |
020 | |a 9783642043413 |c PB. : EUR 57.78 (freier Pr.), sfr 84.00 (freier Pr.) |9 978-3-642-04341-3 | ||
020 | |a 3642043410 |9 3-642-04341-0 | ||
024 | 3 | |a 9783642043413 | |
028 | 5 | 2 | |a 12752768 |
035 | |a (OCoLC)436030817 | ||
035 | |a (DE-599)DNB995948003 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a DAT 055f |2 stub | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
245 | 1 | 0 | |a Recent advances in intrusion detection |b 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings |c Engin Kirda ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XIII, 384 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 5758 | |
650 | 4 | |a Eindringerkennung - Kongress - Saint-Malo <2009> | |
650 | 4 | |a Kryptoanalyse - Kongress - Saint-Malo <2009> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Saint-Malo |2 gnd-content | |
689 | 0 | 0 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Kirda, Engin |e Sonstige |0 (DE-588)136202209 |4 oth | |
711 | 2 | |a RAID |n 12 |d 2009 |c Saint-Malo |j Sonstige |0 (DE-588)6102619-0 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 5758 |w (DE-604)BV000000607 |9 5758 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018016703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018016703 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 001z 2001 A 999 |
---|---|
DE-BY-TUM_katkey | 1709123 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040010159554 |
_version_ | 1822409180011560960 |
adam_text |
IMAGE 1
TABLE OF CONTENTS
RECENT ADVANCES IN INTRUSION DETECTION ANOMALY AND SPECIFICATION-BASED
APPROACHES PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED
NETWORK INTRUSION DETECTION SYSTEMS 1
DAMIANO BOLZONI, SANDRO ETALLE, AND PIETER H. HARTEL PROTECTING A MOVING
TARGET: ADDRESSING WEB APPLICATION CONCEPT DRIFT 21
FEDERICO MAGGI, WILLIAM ROBERTSON, CHRISTOPHER KRUEGEL, AND GIOVANNI
VIGNA ADAPTIVE ANOMALY DETECTION VIA SELF-CALIBRATION AND DYNAMIC
UPDATING 41
GABRIELA F. CRETU-CIOCARLIE, ANGELOS STAVROU, MICHAEL E. LOCASTO, AND
SALVATORE J. STOLFO
RUNTIME MONITORING AND DYNAMIC RECONFIGURATION FOR INTRUSION DETECTION
SYSTEMS 61
MARTIN REHAK, EUGEN STAAB, VOLKER FUSENIG, MICHAL PECHOUCEK, MARTIN
GRILL, JAN STIBOREK, KAREL BARIOS, AND THOMAS ENGEL
MALWARE DETECTION AND PREVENTION (I)
MALWARE BEHAVIORAL DETECTION BY ATTRIBUTE-AUTOMATA USING ABSTRACTION
FROM PLATFORM AND LANGUAGE 81
GREGOIRE JACOB, HERVE DEBAR, AND ERIC FILIOL
AUTOMATIC GENERATION OF STRING SIGNATURES FOR MALWARE DETECTION 101 KENT
GRIFFIN, SCOTT SCHNEIDER, XIN HU, AND TZI-CKER CHIUEH PE-MINER: MINING
STRUCTURAL INFORMATION TO DETECT MALICIOUS EXECUTABLES IN REALTIME 121
M. ZUBAIR SHAFIQ, S. MOMINA TABISH, FAUZAN MIRZA, AND MUDDASSAR FAROOQ
NETWORK AND HOST INTRUSION DETECTION AND PREVENTION AUTOMATICALLY
ADAPTING A TRAINED ANOMALY DETECTOR TO SOFTWARE PATCHES 142
PENG LI, DEBIN GAO, AND MICHAEL K. REITER
TOWARDS GENERATING HIGH COVERAGE VULNERABILITY-BASED SIGNATURES WITH
PROTOCOL-LEVEL CONSTRAINT-GUIDED EXPLORATION 161
JUAN CABALLERO, ZHENKAI LIANG, PONGSIN POOSANKAM, AND DAWN SONG
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/995948003
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
AUTOMATED BEHAVIORAL FINGERPRINTING 182
JEROME FRANCOIS, HUMBERTO ABDELNUR, RADU STATE, AND OLIVIER FESTOR
INTRUSION DETECTION FOR MOBILE DEVICES
SMS-WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY
DETECTION 202
GUANHUA YAN, STEPHAN EIDENBENZ, AND EMANUELE GALLI
KEYSTROKE-BASED USER IDENTIFICATION ON SMART PHONES 224 SAIRA ZAHID,
MUHAMMAD SHAHZAD, SYED AH KHAYAM, AND MUDDASSAR FAROOQ
VIRUSMETER: PREVENTING YOUR CELLPHONE FROM SPIES 244 LEI LIU, GUANHUA
YAN, XINWEN ZHANG, AND SONGQING CHEN
HIGH-PERFORMANCE INTRUSION DETECTION
REGULAR EXPRESSION MATCHING ON GRAPHICS HARDWARE FOR INTRUSION DETECTION
265
GIORGOS VASILIADIS, MICHAIIS POLYCHRONAKIS, SPIROS ANTONATOS, EVANGELOS
P. MARKATOS, AND SOTIRIS IOANNIDIS
MULTI-BYTE REGULAR EXPRESSION MATCHING WITH SPECULATION 284 DANIEL
LUCHAUP, RANDY SMITH, CRISTIAN ESTAN, AND SOMESH JHA
MALWARE DETECTION AND PREVENTION (II)
TOWARD REVEALING KERNEL MALWARE BEHAVIOR IN VIRTUAL EXECUTION
ENVIRONMENTS 304
CHAOTING XUAN, JOHN COPELAND, AND RAHEEM BEYAH
EXPLOITING TEMPORAL PERSISTENCE TO DETECT COVERT BOTNET CHANNELS . . .
326 FREDERIC GIROIRE, JAIDEEP CHANDRASHEKAR, NINA TAFT, EVE SCHOOLER,
AND DINA PAPAGIANNAKI
POSTERS
AN EXPERIMENTAL STUDY ON INSTANCE SELECTION SCHEMES FOR EFFICIENT
NETWORK ANOMALY DETECTION 346
YANG LI, LI GUO, BIN-XING FANG, XIANG-TAO LIU, AND LIN-QI
AUTOMATIC SOFTWARE INSTRUMENTATION FOR THE DETECTION OF NON-CONTROL-DATA
ATTACKS ._ 348
JONATHAN-CHRISTO F ER DEMAY, ERIC TOTEL, AND FREDERIC TRONEL
IMAGE 3
TABLE OF CONTENTS XIII
BLADE: SLASHING THE INVISIBLE CHANNEL OF DRIVE-BY DOWNLOAD MALWARE 350
LONG LU, VINOD YEGNESWARAN, PHILLIP PORRAS, AND WENKE LEE
CERN INVESTIGATION OF NETWORK BEHAVIOUR AND ANOMALY DETECTION . . . 353
MILOSZ MARIAN HULBOJ AND RYSZARD ERAZM JURGA
BLARE TOOLS: A POLICY-BASED INTRUSION DETECTION SYSTEM AUTOMATICALLY SET
BY THE SECURITY POLICY 355
LAURENT GEORGE, VALERIE VIET TRIEM TONG, AND LUDOVIC ME
DETECTION, ALERT AND RESPONSE TO MALICIOUS BEHAVIOR IN MOBILE DEVICES:
KNOWLEDGE-BASED APPROACH 357
ASA} SHABTAI, URI KANONOV, AND YUVAL ELOVICI
AUTONOMIE INTRUSION DETECTION SYSTEM 359
WEI WANG, THOMAS GUYET, AND SVEIN J. KNAPSKOG
ALICE@HOME: DISTRIBUTED FRAMEWORK FOR DETECTING MALICIOUS S I T E S . .
. 362 IKPEME ERETE, VINOD YEGNESWARAN, AND PHILLIP PORRAS
PACKET SPACE ANALYSIS OF INTRUSION DETECTION SIGNATURES 365
FREDERIC MASSICOTTE
TRAFFIC BEHAVIOUR CHARACTERIZATION USING NETMATE 367
ANNIE DE MONTIGNY-LEBOEUF, MATHIEU COUTURE, AND FREDERIC MASSICOTTE
ON THE INEFFICIENT USE OF ENTROPY FOR ANOMALY DETECTION 369
MOBIN JAVED, AYESHA BINTE ASHFAQ, M. ZUBAIR SHAFIQ, AND SYED ALI KHAYAM
BROWSER-BASED INTRUSION PREVENTION SYSTEM 371
IKPEME ERETE
USING FORMAL GRAMMAR AND GENETIC OPERATORS TO EVOLVE MALWARE 374 SADIA
NOREEN, SHAFAQ MURTAZA, M. ZUBAIR SHAFIQ, AND MUDDASSAR FAROOQ
METHOD FOR DETECTING UNKNOWN MALICIOUS EXECUTABLES 376
BORIS ROZENBERG, EHUD GUDES, YUVAL ELOVICI, AND YUVAL FIEDEL
BRAVE NEW WORLD: PERVASIVE INSECURITY OF EMBEDDED NETWORK DEVICES 378
ANG CUI, YINGBO SONG, PRATAP V. PRABHU, AND SALVATORE J. STOLFO
DAEDALUS: NOVEL APPLICATION OF LARGE-SCALE DARKNET MONITORING FOR
PRACTICAL PROTECTION OF LIVE NETWORKS (EXTENDED ABSTRACT) 381
DAISUKE INOUE, MIO SUZUKI, MASASHI ETO, KATSUNARI YOSHIOKA, AND KOJI
NAKAO
AUTHOR INDEX 383 |
any_adam_object | 1 |
author_GND | (DE-588)136202209 |
building | Verbundindex |
bvnumber | BV035740278 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 055f DAT 460f |
ctrlnum | (OCoLC)436030817 (DE-599)DNB995948003 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035740278</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100915</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090924s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N36,0077</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">995948003</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642043413</subfield><subfield code="c">PB. : EUR 57.78 (freier Pr.), sfr 84.00 (freier Pr.)</subfield><subfield code="9">978-3-642-04341-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642043410</subfield><subfield code="9">3-642-04341-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642043413</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12752768</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)436030817</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB995948003</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Recent advances in intrusion detection</subfield><subfield code="b">12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings</subfield><subfield code="c">Engin Kirda ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 384 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5758</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Eindringerkennung - Kongress - Saint-Malo <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - Saint-Malo <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Saint-Malo</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kirda, Engin</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)136202209</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">RAID</subfield><subfield code="n">12</subfield><subfield code="d">2009</subfield><subfield code="c">Saint-Malo</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)6102619-0</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">5758</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5758</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018016703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018016703</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Saint-Malo gnd-content |
genre_facet | Konferenzschrift 2009 Saint-Malo |
id | DE-604.BV035740278 |
illustrated | Illustrated |
indexdate | 2025-01-27T13:33:48Z |
institution | BVB |
institution_GND | (DE-588)6102619-0 |
isbn | 9783642043413 3642043410 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018016703 |
oclc_num | 436030817 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIII, 384 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.) Berlin [u.a.] Springer 2009 XIII, 384 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture Notes in Computer Science 5758 Eindringerkennung - Kongress - Saint-Malo <2009> Kryptoanalyse - Kongress - Saint-Malo <2009> Computer security Congresses Computers Access control Congresses Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Eindringerkennung (DE-588)4706627-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Saint-Malo gnd-content Eindringerkennung (DE-588)4706627-1 s DE-604 Kryptoanalyse (DE-588)4830502-9 s Kirda, Engin Sonstige (DE-588)136202209 oth RAID 12 2009 Saint-Malo Sonstige (DE-588)6102619-0 oth Lecture Notes in Computer Science 5758 (DE-604)BV000000607 5758 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018016703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Lecture Notes in Computer Science Eindringerkennung - Kongress - Saint-Malo <2009> Kryptoanalyse - Kongress - Saint-Malo <2009> Computer security Congresses Computers Access control Congresses Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4706627-1 (DE-588)1071861417 |
title | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings |
title_auth | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings |
title_exact_search | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings |
title_full | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.) |
title_fullStr | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.) |
title_full_unstemmed | Recent advances in intrusion detection 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings Engin Kirda ... (eds.) |
title_short | Recent advances in intrusion detection |
title_sort | recent advances in intrusion detection 12th international symposium raid 2009 saint malo france september 23 25 2009 proceedings |
title_sub | 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 ; proceedings |
topic | Eindringerkennung - Kongress - Saint-Malo <2009> Kryptoanalyse - Kongress - Saint-Malo <2009> Computer security Congresses Computers Access control Congresses Kryptoanalyse (DE-588)4830502-9 gnd Eindringerkennung (DE-588)4706627-1 gnd |
topic_facet | Eindringerkennung - Kongress - Saint-Malo <2009> Kryptoanalyse - Kongress - Saint-Malo <2009> Computer security Congresses Computers Access control Congresses Kryptoanalyse Eindringerkennung Konferenzschrift 2009 Saint-Malo |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018016703&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT kirdaengin recentadvancesinintrusiondetection12thinternationalsymposiumraid2009saintmalofranceseptember23252009proceedings AT raidsaintmalo recentadvancesinintrusiondetection12thinternationalsymposiumraid2009saintmalofranceseptember23252009proceedings |