標題: Titlebook: Research in Attacks, Intrusions and Defenses; 15th International S Davide Balzarotti,Salvatore J. Stolfo,Marco Cova Conference proceedings [打印本頁] 作者: Combat 時間: 2025-3-21 19:18
書目名稱Research in Attacks, Intrusions and Defenses影響因子(影響力)
書目名稱Research in Attacks, Intrusions and Defenses影響因子(影響力)學科排名
書目名稱Research in Attacks, Intrusions and Defenses網絡公開度
書目名稱Research in Attacks, Intrusions and Defenses網絡公開度學科排名
書目名稱Research in Attacks, Intrusions and Defenses被引頻次
書目名稱Research in Attacks, Intrusions and Defenses被引頻次學科排名
書目名稱Research in Attacks, Intrusions and Defenses年度引用
書目名稱Research in Attacks, Intrusions and Defenses年度引用學科排名
書目名稱Research in Attacks, Intrusions and Defenses讀者反饋
書目名稱Research in Attacks, Intrusions and Defenses讀者反饋學科排名
作者: 歡呼 時間: 2025-3-21 23:22 作者: 嚴峻考驗 時間: 2025-3-22 03:37
https://doi.org/10.1007/978-3-642-33338-5cloud computing; malware; memory access; network security; trust作者: Matrimony 時間: 2025-3-22 06:12
978-3-642-33337-8Springer-Verlag Berlin Heidelberg 2012作者: GRIN 時間: 2025-3-22 10:40
Research in Attacks, Intrusions and Defenses978-3-642-33338-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: prodrome 時間: 2025-3-22 14:54
Trusted VM Snapshots in Untrusted Cloud Infrastructuresers could establish trust with secure runtime integrity measurements of their virtual machines (VMs). The runtime state of a VM, captured via a snapshot, is used for integrity measurement, migration, malware detection, correctness validation, and other purposes. However, commodity virtualized enviro作者: 使高興 時間: 2025-3-22 17:47
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection virtual machine introspection and not relying on in-guest components, but do not achieve robustness due to the semantic gap. In-guest applications achieve robustness by utilizing guest OS code for monitoring, but not security, since an attacker can tamper with this code and the application itself. 作者: 蟄伏 時間: 2025-3-23 00:19 作者: 舊式步槍 時間: 2025-3-23 04:16
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threatous incident reports have focused on describing the anatomy of specific incidents and data breaches. In this paper, we provide an in-depth analysis of a large corpus of targeted attacks identified by Symantec during the year 2011. Using advanced . data analytics, we are able to attribute series of t作者: 褻瀆 時間: 2025-3-23 06:20
Memory Errors: The Past, the Present, and the Futureto stop them? Given the host of security measures on modern machines, are we less vulnerable than before, and can we expect to eradicate memory error problems in the near future? In this paper, we present a quarter century worth of memory errors: attacks, defenses, and statistics. A historical overv作者: PTCA635 時間: 2025-3-23 12:58 作者: CANT 時間: 2025-3-23 14:40
: A Flexible Disk Monitoring and Analysis Frameworktion can be difficult, malware fortunately leaves artifacts of its presence on disk. In this paper, we present ., a flexible policy-based disk I/O monitoring and analysis infrastructure that can be used to analyze and understand malware behavior. . interposes between a system-under-analysis and its 作者: Flirtatious 時間: 2025-3-23 22:00 作者: laparoscopy 時間: 2025-3-23 23:24
Paying for Piracy? An Analysis of One-Click Hosters’ Controversial Reward Schemesn then share the files with friends or make them publicly available by publishing the download links in separate directories, so-called direct download or streaming sites. While OCHs have legitimate use cases, they are also frequently used to distribute pirated content. Many OCHs operate affiliate p作者: 混沌 時間: 2025-3-24 04:26
Proactive Discovery of Phishing Related Domain Namesntly reactive blacklisting; however, as phishing attacks are mainly performed over short periods of time, reactive methods are too slow. As a result, new approaches to early identify malicious websites are needed. In this paper a new proactive discovery of phishing related domain names is introduced作者: condone 時間: 2025-3-24 08:08 作者: 燈絲 時間: 2025-3-24 11:42
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoals, such as spreading spam or scams, distributing malware and launching drive-by download attacks. While most current related work focuses on measuring or detecting specific search poisoning attacks in the crawled dataset, it is also meaningful to design an effective approach to find more compromi作者: ALLEY 時間: 2025-3-24 17:47 作者: 牲畜欄 時間: 2025-3-24 22:53
FlashDetect: ActionScript 3 Malware Detection malicious Flash files has been limited. Similarly, there is very little documentation available about the techniques commonly used by Flash malware. Instead, most research has focused on JavaScript malware..This paper discusses common techniques such as heap spraying, JIT spraying, and type confusi作者: 發(fā)源 時間: 2025-3-25 01:52 作者: venous-leak 時間: 2025-3-25 06:53 作者: 男學院 時間: 2025-3-25 10:42
GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processorstterns that indicate suspicious or malicious behavior. Regular expressions offer rich context for describing these patterns. Unfortunately, large rule sets containing thousands of patterns coupled with high link-speeds leave most regular expression matching methods incapable of matching at real-time作者: GROSS 時間: 2025-3-25 14:56 作者: 容易生皺紋 時間: 2025-3-25 19:02 作者: 生命層 時間: 2025-3-25 20:15 作者: 戰(zhàn)勝 時間: 2025-3-26 01:46 作者: 挑剔為人 時間: 2025-3-26 06:18
Conference proceedings 2012d and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.作者: 憲法沒有 時間: 2025-3-26 12:04 作者: Eeg332 時間: 2025-3-26 15:48
Assessing the Trustworthiness of Driversysis can capture the evidence of malicious driver behaviour through comparison and difference telling. Evaluation shows that it can faithfully reveal various kernel integrity/confidentiality manipulation and resource starvation attacks launched by compromised drivers, thus to assess the trustworthiness of the evaluated drivers.作者: 不能約 時間: 2025-3-26 19:10
A Memory Access Validation Scheme against Payload Injection Attacksce impact with two simulators. The experimental results show that our scheme is able to detect the synthesized payload injection attacks and to manage taint information with moderate memory overhead under acceptable performance impact.作者: ARM 時間: 2025-3-27 00:57
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks in the MANET environment, but also provides authentication for forwarding paths. We prove that AK-PPM can achieve ., and present the performance measurement of AK-PPM in MANETs with both analytical models and simulations.作者: MITE 時間: 2025-3-27 02:26 作者: 同義聯(lián)想法 時間: 2025-3-27 07:15
Proactive Discovery of Phishing Related Domain Nameshing related activities - “secure”, “banking”, brand names, etc. Once a pro-active blacklist is created, ongoing and daily monitoring of only these domains can lead to the efficient detection of phishing web sites.作者: 極小 時間: 2025-3-27 13:28
DEMACRO: Defense against Malicious Cross-Domain Requestsects potentially malicious cross-domain requests and de-authenticates them by removing existing session credentials. Our system requires no training or user interaction and imposes minimal performance overhead on the user’s browser.作者: restrain 時間: 2025-3-27 17:19
FlashDetect: ActionScript 3 Malware Detectiont?3. . classifies submitted files using a naive Bayesian classifier based on a set of predefined features. Our experiments show that . has high classification accuracy, and that its efficacy is comparable with that of commercial anti-virus products.作者: peritonitis 時間: 2025-3-27 20:15
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols n-gram analysis on real-life environments. Our tests show that the analyzed systems, in presence of data with high variability, cannot deliver high detection and low false positive rates at the same time.作者: Optic-Disk 時間: 2025-3-28 01:21 作者: 愉快嗎 時間: 2025-3-28 02:32 作者: 媽媽不開心 時間: 2025-3-28 07:21
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)bedding support for their local languages and using a larger set of phrases. Similarly, uploading a photo of valuable items on social networks can also incentivize crime. Moreover, sleeping and drinking patterns identified from uploads, can help criminals in planning their crime execution hours.作者: Bronchial-Tubes 時間: 2025-3-28 11:02 作者: 核心 時間: 2025-3-28 15:07 作者: innovation 時間: 2025-3-28 20:13
Abhinav Srivastava,Himanshu Raj,Jonathon Giffin,Paul Englandgh both demography and gender relations have been the focus of research for quite some time, the intersection of gender studies and demographic analysis is a more recent phenomenon. Fortunately, gender aspects of dem- raphy and demographic aspects of gender are two lines of research that have receiv作者: Inoperable 時間: 2025-3-29 01:40 作者: Gentry 時間: 2025-3-29 05:03
Shengzhi Zhang,Peng Liuanalysis is a more recent phenomenon. Fortunately, gender aspects of dem- raphy and demographic aspects of gender are two lines of research that have received increased attention in recent years, there is a growing group of researchers active in this area, and consequently, a growing body of publica作者: STIT 時間: 2025-3-29 10:06 作者: genuine 時間: 2025-3-29 11:23
Victor van der Veen,Nitish dutt-Sharma,Lorenzo Cavallaro,Herbert Bosanalysis is a more recent phenomenon. Fortunately, gender aspects of dem- raphy and demographic aspects of gender are two lines of research that have received increased attention in recent years, there is a growing group of researchers active in this area, and consequently, a growing body of publica作者: limber 時間: 2025-3-29 16:42 作者: blithe 時間: 2025-3-29 22:11
Jennifer Mankin,David Kaeligh both demography and gender relations have been the focus of research for quite some time, the intersection of gender studies and demographic analysis is a more recent phenomenon. Fortunately, gender aspects of dem- raphy and demographic aspects of gender are two lines of research that have receiv作者: STERN 時間: 2025-3-30 01:03 作者: 無畏 時間: 2025-3-30 07:00 作者: palette 時間: 2025-3-30 11:07
Samuel Marchal,Jér?me Fran?ois,Radu State,Thomas Engelgh both demography and gender relations have been the focus of research for quite some time, the intersection of gender studies and demographic analysis is a more recent phenomenon. Fortunately, gender aspects of dem- raphy and demographic aspects of gender are two lines of research that have receiv作者: CAMEO 時間: 2025-3-30 14:39
Daisuke Mashima,Alvaro A. Cárdenastalism in Africa.Features authors from various disciplinary .This book examines the complex and multifaceted nature of African Pentecostal engagements with genders and sexualities. In the last three decades, African Pentecostalism has emerged as one the most visible and profound aspects of religious作者: intangibility 時間: 2025-3-30 18:23 作者: 柳樹;枯黃 時間: 2025-3-30 23:12 作者: languor 時間: 2025-3-31 03:33 作者: Picks-Disease 時間: 2025-3-31 08:08 作者: rheumatism 時間: 2025-3-31 09:35
Victor C. Valgenti,Jatin Chhugani,Yan Sun,Nadathur Satish,Min Sik Kim,Changkyu Kim,Pradeep Dubey huisarts; ook hier zijn vrouwen in de meerderheid. Ernstige aanhoudende lichamelijke klachten komen in 2,5?% van de consulten bij de huisarts voor. Hormonale verschillen, aangeleerd gedrag en negatieve affectiviteit lijken relevante verklaringen voor de man-vrouwverschillen in vóórkomen van klachte作者: PANEL 時間: 2025-3-31 16:37
Dina Had?iosmanovi?,Lorenzo Simionato,Damiano Bolzoni,Emmanuele Zambon,Sandro Etallencrete handvatten.Behandelt veel verschillende ziektebeelden.Dit boek helpt huisartsen om kennis over verschillen tussen vrouwen en mannen in ziekte en gezondheid toe te passen. De kennis over sekse- en genderspecifieke aspecten in epidemiologie, ontstaanswijze, pathofysiologie, diagnostiek, beloop 作者: 杠桿支點 時間: 2025-3-31 21:31 作者: OATH 時間: 2025-3-31 22:25
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspectionque, localized shepherding. The combination of these two techniques allows SYRINGE to incorporate the best of out-of-guest monitoring with that of in-guest monitoring. We implemented a prototype of SYRINGE as a Linux application to monitor a guest running Windows XP and have evaluated its performanc作者: 溺愛 時間: 2025-4-1 02:55 作者: 媒介 時間: 2025-4-1 07:13 作者: laceration 時間: 2025-4-1 12:07 作者: 挫敗 時間: 2025-4-1 14:50
ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detectionn detection system that constructs normal behavior models with respect to device access patterns and the configuration and control activities of individual accounts from their long-term historical logs and alerts in real-time when usage deviates from the models. Our evaluation shows that this system作者: municipality 時間: 2025-4-1 18:46
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligences of the intelligence volume it can handle under realistic workloads, and the latency with which real-time updates become available to the IDS analysis engine. The implementation is freely available as open-source software.作者: 含糊 時間: 2025-4-2 00:19