Detection of Intrusions and Malware & Vulnerability Assessment

Third International Conference, DIMVA 2006, Berlin, Germany, July 13-14, 2006. Proceedings

  • Roland Büschkes
  • Pavel Laskov
Conference proceedings DIMVA 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4064)

Table of contents

  1. Front Matter
  2. Code Analysis

    1. Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl Levitt, Matt Bishop
      Pages 1-16
    2. Manuel Egele, Martin Szydlowski, Engin Kirda, Christopher Kruegel
      Pages 17-36
  3. Intrusion Detection

    1. Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos
      Pages 54-73
    2. Konrad Rieck, Pavel Laskov
      Pages 74-90
  4. Threat Protection and Response

    1. Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee
      Pages 91-108
    2. Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens
      Pages 109-128
  5. Malware and Forensics

    1. Danilo Bruschi, Lorenzo Martignoni, Mattia Monga
      Pages 129-143
    2. André Årnes, Paul Haas, Giovanni Vigna, Richard A. Kemmerer
      Pages 144-163
  6. Deployment Scenarios

    1. Marko Jahnke, Jens Tölle, Sascha Lettgen, Michael Bussmann, Uwe Weddige
      Pages 164-180
    2. Arno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi, Bernhard Plattner
      Pages 181-194
  7. Back Matter

About these proceedings


Code Deployment SNMP access control anormality detection audit control authentication cryptographic attacks intrusion detection log-data analysis network intrusion network security pattern analysis security trust

Editors and affiliations

  • Roland Büschkes
    • 1
  • Pavel Laskov
    • 2
  1. 1.RWE AGEssenGermany
  2. 2.Wilhelm-Schickard-Institute for Computer ScienceUniversity of TübingenTübingenGermany

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking