|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Sven DietrichPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 2014 ed. Volume: 8550 Dimensions: Width: 15.50cm , Height: 1.50cm , Length: 23.50cm Weight: 4.453kg ISBN: 9783319085081ISBN 10: 3319085085 Pages: 277 Publication Date: 04 August 2014 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsData Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! (Or: Automated Techniques to Recover Split and Merged Variables).- Identifying Shared Software Components to Support Malware Forensics.- Instruction-Level Steganography for Covert Trigger-Based Malware.- AndRadar: Fast Discovery of Android Applications in Alternative Markets.- Attacks on Android Clipboard.- I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics.- AV-Meter: An Evaluation of Antivirus Scans and Labels.- PExy: The Other Side of Exploit Kits.- Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware.- Parallelization of Network Intrusion Detection Systems under Attack Conditions.- Phoenix: DGA-Based Botnet Tracking and Intelligence.- Quantifiable Run-Time Kernel Attack Surface Reduction.- Bee Master: Detecting Host-Based Code Injection Attacks.- Diagnosis and Emergency Patch Generation for Integer Overflow Exploits.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |