๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[Lecture Notes in Computer Science] Detection of Intrusions and Malware, and Vulnerability Assessment Volume 8550 || Instruction-Level Steganography for Covert Trigger-Based Malware

โœ Scribed by Dietrich, Sven


Book ID
125481669
Publisher
Springer International Publishing
Year
2014
Tongue
English
Weight
167 KB
Edition
3
Category
Article
ISBN
3319085093

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13 revised full papers presented together with one extended abstract were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on malware, mobile security, network security and host security.


๐Ÿ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Dete
โœ Dietrich, Sven ๐Ÿ“‚ Article ๐Ÿ“… 2014 ๐Ÿ› Springer International Publishing ๐ŸŒ English โš– 418 KB

This book constitutes the refereed proceedings of the 11th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2014, held in Egham, UK, in July 2014. The 13 revised full papers presented together with one extended abstract were carefully reviewed and