|
|
|
|
LEADER |
02280nmm a2200433 u 4500 |
001 |
EB001848165 |
003 |
EBX01000000000000001012469 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
181001 ||| eng |
020 |
|
|
|a 9783030004705
|
100 |
1 |
|
|a Bailey, Michael
|e [editor]
|
245 |
0 |
0 |
|a Research in Attacks, Intrusions, and Defenses
|h Elektronische Ressource
|b 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings
|c edited by Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis
|
250 |
|
|
|a 1st ed. 2018
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2018, 2018
|
300 |
|
|
|a XIV, 712 p. 162 illus
|b online resource
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Operating Systems
|
653 |
|
|
|a Operating systems (Computers)
|
653 |
|
|
|a Application software
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Information technology / Law and legislation
|
653 |
|
|
|a Computer and Information Systems Applications
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computers / Law and legislation
|
653 |
|
|
|a Legal Aspects of Computing
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Holz, Thorsten
|e [editor]
|
700 |
1 |
|
|a Stamatogiannakis, Manolis
|e [editor]
|
700 |
1 |
|
|a Ioannidis, Sotiris
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-030-00470-5
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-00470-5?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses
|