000 | 03281nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-00470-5 | ||
003 | DE-He213 | ||
005 | 20200812103812.0 | ||
007 | cr nn 008mamaa | ||
008 | 180906s2018 gw | s |||| 0|eng d | ||
020 |
_a9783030004705 _9978-3-030-00470-5 |
||
024 | 7 |
_a10.1007/978-3-030-00470-5 _2doi |
|
040 | _cCUS | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aResearch in Attacks, Intrusions, and Defenses _h[electronic resource] : _b21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings / _cedited by Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXIV, 712 p. 162 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology ; _v11050 |
|
520 | _aThis book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aComputers. | |
650 | 0 | _aLaw and legislation. | |
650 | 0 | _aApplication software. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputer communication systems. | |
650 | 1 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aComputers and Society. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24040 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24059 |
650 | 2 | 4 |
_aInformation Systems Applications (incl. Internet). _0https://scigraph.springernature.com/ontologies/product-market-codes/I18040 |
650 | 2 | 4 |
_aOperating Systems. _0https://scigraph.springernature.com/ontologies/product-market-codes/I14045 |
650 | 2 | 4 |
_aComputer Communication Networks. _0https://scigraph.springernature.com/ontologies/product-market-codes/I13022 |
700 | 1 | _aBailey, Michael. | |
700 | 1 |
_aHolz, Thorsten. _1https://orcid.org/0000-0002-2783-1264 |
|
700 | 1 |
_aStamatogiannakis, Manolis. _1https://orcid.org/0000-0002-5527-8726 |
|
700 | 1 | _aIoannidis, Sotiris. | |
830 | 0 |
_aSecurity and Cryptology ; _v11050 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-00470-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c203752 _d203752 |