000 | 02983nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-319-26362-5 | ||
003 | DE-He213 | ||
005 | 20240730191552.0 | ||
007 | cr nn 008mamaa | ||
008 | 151026s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319263625 _9978-3-319-26362-5 |
||
024 | 7 |
_a10.1007/978-3-319-26362-5 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUB _2bicssc |
|
072 | 7 |
_aCOM005000 _2bisacsh |
|
072 | 7 |
_aUX _2thema |
|
082 | 0 | 4 |
_a005.3 _223 |
245 | 1 | 0 |
_aResearch in Attacks, Intrusions, and Defenses _h[electronic resource] : _b18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings / _cedited by Herbert Bos, Fabian Monrose, Gregory Blanc. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXIII, 638 p. 147 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9404 |
|
520 | _aThis book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses. | ||
650 | 0 |
_aApplication software. _9146510 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9146511 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aComputer and Information Systems Applications. _9146512 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputer Communication Networks. _9146513 |
700 | 1 |
_aBos, Herbert. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146514 |
|
700 | 1 |
_aMonrose, Fabian. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146515 |
|
700 | 1 |
_aBlanc, Gregory. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9146516 |
|
710 | 2 |
_aSpringerLink (Online service) _9146517 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319263618 |
776 | 0 | 8 |
_iPrinted edition: _z9783319263632 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9404 _9146518 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-26362-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93795 _d93795 |