Advertisement

Detection of Intrusions and Malware, and Vulnerability Assessment

11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings

  • Sven Dietrich

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8550)

Table of contents

  1. Front Matter
  2. Malware I

    1. Asia Slowinska, Istvan Haller, Andrei Bacs, Silviu Baranga, Herbert Bos
      Pages 1-20
    2. Brian Ruttenberg, Craig Miles, Lee Kellogg, Vivek Notani, Michael Howard, Charles LeDoux et al.
      Pages 21-40
    3. Dennis Andriesse, Herbert Bos
      Pages 41-50
  3. Mobile Security

    1. Martina Lindorfer, Stamatis Volanis, Alessandro Sisto, Matthias Neugschwandtner, Elias Athanasopoulos, Federico Maggi et al.
      Pages 51-71
    2. Xiao Zhang, Wenliang Du
      Pages 72-91
    3. Cristiano Giuffrida, Kamil Majdanik, Mauro Conti, Herbert Bos
      Pages 92-111
  4. Malware II

    1. Aziz Mohaisen, Omar Alrawi
      Pages 112-131
    2. Giancarlo De Maio, Alexandros Kapravelos, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna
      Pages 132-151
  5. Network Security

    1. René Rietz, Michael Vogel, Franka Schuster, Hartmut König
      Pages 172-191
    2. Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero
      Pages 192-211
  6. Host Security

    1. Anil Kurmus, Sergej Dechand, Rüdiger Kapitza
      Pages 212-234
    2. Thomas Barabosch, Sebastian Eschweiler, Elmar Gerhards-Padilla
      Pages 235-254
    3. Tielei Wang, Chengyu Song, Wenke Lee
      Pages 255-275
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014.

The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on malware, mobile security, network security and host security.

Keywords

anomaly detection intrusion detection systems malware mitigation mobile devices network security security services systems security

Editors and affiliations

  • Sven Dietrich
    • 1
  1. 1.Department of Computer Science, Castle Point on HudsonStevens Institute of TechnologyHobokenUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-08509-8
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-08508-1
  • Online ISBN 978-3-319-08509-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering