Automatic Malware Analysis an Emulator Based Approach

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yin Heng (VerfasserIn), Song, Dawn (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: New York, NY [u.a.] Springer 2013
Schriftenreihe:SpringerBriefs in Computer Science
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-M347
DE-92
DE-859
DE-473
DE-355
DE-703
DE-20
DE-29
DE-739
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV040512939
003 DE-604
005 20130117
007 cr|uuu---uuuuu
008 121030s2013 xx ad|| o|||| 00||| eng d
020 |a 9781461455233  |c Online  |9 978-1-461-45523-3 
024 7 |a 10.1007/978-1-461-45523-3  |2 doi 
035 |a (OCoLC)812052240 
035 |a (DE-599)BVBBV040512939 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-473  |a DE-M347  |a DE-20  |a DE-703  |a DE-Aug4  |a DE-92  |a DE-29  |a DE-859  |a DE-634  |a DE-739  |a DE-355 
050 0 |a QA76.9.A25 
100 0 |a Yin Heng  |e Verfasser  |0 (DE-588)136034802  |4 aut 
245 1 0 |a Automatic Malware Analysis  |b an Emulator Based Approach  |c Heng Yin ; Dawn Song 
264 1 |a New York, NY [u.a.]  |b Springer  |c 2013 
300 |a 1 Online-Ressource (IX, 73 S.)  |b Ill., graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a SpringerBriefs in Computer Science 
533 |a Online-Ausgabe  |e Online-Ressource 
650 0 7 |a Analyse  |0 (DE-588)4122795-5  |2 gnd  |9 rswk-swf 
650 0 7 |a Automation  |0 (DE-588)4003957-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Malware  |0 (DE-588)4687059-3  |2 gnd  |9 rswk-swf 
689 0 0 |a Malware  |0 (DE-588)4687059-3  |D s 
689 0 1 |a Analyse  |0 (DE-588)4122795-5  |D s 
689 0 2 |a Automation  |0 (DE-588)4003957-2  |D s 
689 0 |5 DE-604 
700 1 |a Song, Dawn  |e Verfasser  |4 aut 
776 0 8 |i Reproduktion von  |a Yin Heng  |t Automatic Malware Analysis  |d 2013 
776 0 8 |i Erscheint auch als  |n Druckausgabe  |z 978-1-461-45522-6 
856 4 0 |u https://doi.org/10.1007/978-1-4614-5523-3  |x Verlag  |3 Volltext 
912 |a ZDB-2-SCS 
943 1 |a oai:aleph.bib-bvb.de:BVB01-025359430 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-634  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-Aug4  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-M347  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-92  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-859  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-473  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-703  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-20  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-29  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-1-4614-5523-3  |l DE-739  |p ZDB-2-SCS  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819288518417973251
any_adam_object
author Yin Heng
Song, Dawn
author_GND (DE-588)136034802
author_facet Yin Heng
Song, Dawn
author_role aut
aut
author_sort Yin Heng
author_variant y h yh
d s ds
building Verbundindex
bvnumber BV040512939
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-SCS
ctrlnum (OCoLC)812052240
(DE-599)BVBBV040512939
discipline Informatik
doi_str_mv 10.1007/978-1-4614-5523-3
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02729nam a2200577 c 4500</leader><controlfield tag="001">BV040512939</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130117 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">121030s2013 xx ad|| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461455233</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-461-45523-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-461-45523-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)812052240</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040512939</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Yin Heng</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)136034802</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automatic Malware Analysis</subfield><subfield code="b">an Emulator Based Approach</subfield><subfield code="c">Heng Yin ; Dawn Song</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (IX, 73 S.)</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Online-Ausgabe</subfield><subfield code="e">Online-Ressource</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Analyse</subfield><subfield code="0">(DE-588)4122795-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Automation</subfield><subfield code="0">(DE-588)4003957-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Analyse</subfield><subfield code="0">(DE-588)4122795-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Automation</subfield><subfield code="0">(DE-588)4003957-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Song, Dawn</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Reproduktion von</subfield><subfield code="a">Yin Heng</subfield><subfield code="t">Automatic Malware Analysis</subfield><subfield code="d">2013</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-461-45522-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025359430</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-5523-3</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV040512939
illustrated Illustrated
indexdate 2024-12-24T02:52:04Z
institution BVB
isbn 9781461455233
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-025359430
oclc_num 812052240
open_access_boolean
owner DE-473
DE-BY-UBG
DE-M347
DE-20
DE-703
DE-Aug4
DE-92
DE-29
DE-859
DE-634
DE-739
DE-355
DE-BY-UBR
owner_facet DE-473
DE-BY-UBG
DE-M347
DE-20
DE-703
DE-Aug4
DE-92
DE-29
DE-859
DE-634
DE-739
DE-355
DE-BY-UBR
physical 1 Online-Ressource (IX, 73 S.) Ill., graph. Darst.
psigel ZDB-2-SCS
publishDate 2013
publishDateSearch 2013
publishDateSort 2013
publisher Springer
record_format marc
series2 SpringerBriefs in Computer Science
spelling Yin Heng Verfasser (DE-588)136034802 aut
Automatic Malware Analysis an Emulator Based Approach Heng Yin ; Dawn Song
New York, NY [u.a.] Springer 2013
1 Online-Ressource (IX, 73 S.) Ill., graph. Darst.
txt rdacontent
c rdamedia
cr rdacarrier
SpringerBriefs in Computer Science
Online-Ausgabe Online-Ressource
Analyse (DE-588)4122795-5 gnd rswk-swf
Automation (DE-588)4003957-2 gnd rswk-swf
Malware (DE-588)4687059-3 gnd rswk-swf
Malware (DE-588)4687059-3 s
Analyse (DE-588)4122795-5 s
Automation (DE-588)4003957-2 s
DE-604
Song, Dawn Verfasser aut
Reproduktion von Yin Heng Automatic Malware Analysis 2013
Erscheint auch als Druckausgabe 978-1-461-45522-6
https://doi.org/10.1007/978-1-4614-5523-3 Verlag Volltext
spellingShingle Yin Heng
Song, Dawn
Automatic Malware Analysis an Emulator Based Approach
Analyse (DE-588)4122795-5 gnd
Automation (DE-588)4003957-2 gnd
Malware (DE-588)4687059-3 gnd
subject_GND (DE-588)4122795-5
(DE-588)4003957-2
(DE-588)4687059-3
title Automatic Malware Analysis an Emulator Based Approach
title_auth Automatic Malware Analysis an Emulator Based Approach
title_exact_search Automatic Malware Analysis an Emulator Based Approach
title_full Automatic Malware Analysis an Emulator Based Approach Heng Yin ; Dawn Song
title_fullStr Automatic Malware Analysis an Emulator Based Approach Heng Yin ; Dawn Song
title_full_unstemmed Automatic Malware Analysis an Emulator Based Approach Heng Yin ; Dawn Song
title_short Automatic Malware Analysis
title_sort automatic malware analysis an emulator based approach
title_sub an Emulator Based Approach
topic Analyse (DE-588)4122795-5 gnd
Automation (DE-588)4003957-2 gnd
Malware (DE-588)4687059-3 gnd
topic_facet Analyse
Automation
Malware
url https://doi.org/10.1007/978-1-4614-5523-3
work_keys_str_mv AT yinheng automaticmalwareanalysisanemulatorbasedapproach
AT songdawn automaticmalwareanalysisanemulatorbasedapproach