000 | 03255nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-030-00470-5 | ||
003 | DE-He213 | ||
005 | 20240423125308.0 | ||
007 | cr nn 008mamaa | ||
008 | 180906s2018 sz | s |||| 0|eng d | ||
020 |
_a9783030004705 _9978-3-030-00470-5 |
||
024 | 7 |
_a10.1007/978-3-030-00470-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aResearch in Attacks, Intrusions, and Defenses _h[electronic resource] : _b21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings / _cedited by Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXIV, 712 p. 162 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11050 |
|
520 | _aThis book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 |
_aComputers _xLaw and legislation. |
|
650 | 0 |
_aInformation technology _xLaw and legislation. |
|
650 | 0 | _aApplication software. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aLegal Aspects of Computing. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aBailey, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHolz, Thorsten. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aStamatogiannakis, Manolis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aIoannidis, Sotiris. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030004699 |
776 | 0 | 8 |
_iPrinted edition: _z9783030004712 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11050 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-00470-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c176396 _d176396 |