Normal view MARC view ISBD view

Research in Attacks, Intrusions, and Defenses [electronic resource] : 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings / edited by Herbert Bos, Fabian Monrose, Gregory Blanc.

Contributor(s): Bos, Herbert [editor.] | Monrose, Fabian [editor.] | Blanc, Gregory [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 9404Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015Edition: 1st ed. 2015.Description: XIII, 638 p. 147 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319263625.Subject(s): Application software | Software engineering | Algorithms | Data protection | Electronic data processing -- Management | Computer networks  | Computer and Information Systems Applications | Software Engineering | Algorithms | Data and Information Security | IT Operations | Computer Communication NetworksAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.3 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.

There are no comments for this item.

Log in to your account to post a comment.