000 | 03283nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-35504-2 | ||
003 | DE-He213 | ||
005 | 20240730203924.0 | ||
007 | cr nn 008mamaa | ||
008 | 230609s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031355042 _9978-3-031-35504-2 |
||
024 | 7 |
_a10.1007/978-3-031-35504-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aDetection of Intrusions and Malware, and Vulnerability Assessment _h[electronic resource] : _b20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings / _cedited by Daniel Gruss, Federico Maggi, Mathias Fischer, Michele Carminati. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXII, 278 p. 64 illus., 53 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13959 |
|
520 | _aThis book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023. The 12 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in thematical sections named: Side Channels Attacks; Security and Machine Learning; Cyber Physical System Security; Security Issues when Dealing with Users; Analysis of Vulnerable Code; Flow Integrity and Security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aCriminology. _940339 |
|
650 | 0 |
_aQuantum communication. _96620 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9177645 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aCrime Control and Security. _940344 |
650 | 2 | 4 |
_aQuantum Communications and Cryptography. _948138 |
700 | 1 |
_aGruss, Daniel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9177646 |
|
700 | 1 |
_aMaggi, Federico. _eeditor. _0(orcid) _10000-0003-1073-8036 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9177647 |
|
700 | 1 |
_aFischer, Mathias. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9177648 |
|
700 | 1 |
_aCarminati, Michele. _eeditor. _0(orcid) _10000-0001-8284-6074 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9177649 |
|
710 | 2 |
_aSpringerLink (Online service) _9177650 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031355035 |
776 | 0 | 8 |
_iPrinted edition: _z9783031355059 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13959 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-35504-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c97655 _d97655 |