|
|
|
|
LEADER |
02125nmm a2200409 u 4500 |
001 |
EB002167167 |
003 |
EBX01000000000000001304499 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
230704 ||| eng |
020 |
|
|
|a 9783031355042
|
100 |
1 |
|
|a Gruss, Daniel
|e [editor]
|
245 |
0 |
0 |
|a Detection of Intrusions and Malware, and Vulnerability Assessment
|h Elektronische Ressource
|b 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12–14, 2023, Proceedings
|c edited by Daniel Gruss, Federico Maggi, Mathias Fischer, Michele Carminati
|
250 |
|
|
|a 1st ed. 2023
|
260 |
|
|
|a Cham
|b Springer Nature Switzerland
|c 2023, 2023
|
300 |
|
|
|a XII, 278 p. 64 illus., 53 illus. in color
|b online resource
|
653 |
|
|
|a Quantum communication
|
653 |
|
|
|a Crime Control and Security
|
653 |
|
|
|a Computers
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Computer Engineering and Networks
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Criminology
|
653 |
|
|
|a Quantum Communications and Cryptography
|
653 |
|
|
|a Computer engineering
|
653 |
|
|
|a Data and Information Security
|
653 |
|
|
|a Computing Milieux
|
700 |
1 |
|
|a Maggi, Federico
|e [editor]
|
700 |
1 |
|
|a Fischer, Mathias
|e [editor]
|
700 |
1 |
|
|a Carminati, Michele
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Lecture Notes in Computer Science
|
028 |
5 |
0 |
|a 10.1007/978-3-031-35504-2
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-031-35504-2?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023. The 12 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in thematical sections named: Side Channels Attacks; Security and Machine Learning; Cyber Physical System Security; Security Issues when Dealing with Users; Analysis of Vulnerable Code; Flow Integrity and Security
|