Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
0
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,212
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Detection of Intrusions and Malware, and Vulnerability Assessment
other
Editor(s):
Michalis Polychronakis
,
Michael Meier
Publication date
(Print):
2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Human Resources and Assessment
Author and book information
Book
ISBN (Print):
978-3-319-60875-4
ISBN (Electronic):
978-3-319-60876-1
Publication date (Print):
2017
DOI:
10.1007/978-3-319-60876-1
SO-VID:
f32f0661-5b11-401a-899f-3d0848f04e55
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Malware Guard Extension: Using SGX to Conceal Cache Attacks
pp. 25
On the Trade-Offs in Oblivious Execution Techniques
pp. 48
MemPatrol: Reliable Sideline Integrity Monitoring for High-Performance Systems
pp. 73
Measuring and Defeating Anti-Instrumentation-Equipped Malware
pp. 97
DynODet: Detecting Dynamic Obfuscation in Malware
pp. 119
Finding the Needle: A Study of the PE32 Rich Header and Respective Malware Triage
pp. 141
Last Line of Defense: A Novel IDS Approach Against Advanced Threats in Industrial Control Systems
pp. 161
LED-it-GO: Leaking (A Lot of) Data from Air-Gapped Computers via the (Small) Hard Drive LED
pp. 209
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
pp. 230
SPEAKER: Split-Phase Execution of Application Containers
pp. 252
Deep Ground Truth Analysis of Current Android Malware
pp. 279
HumIDIFy: A Tool for Hidden Functionality Detection in Firmware
pp. 301
BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape
pp. 325
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
pp. 347
On the Privacy Impacts of Publicly Leaked Password Databases
pp. 366
Unsupervised Detection of APT C&C Channels using Web Request Graphs
pp. 388
Measuring Network Reputation in the Ad-Bidding Process
Similar content
4,212
A New Generic Taxonomy on Hybrid Malware Detection Technique
Authors:
S. Rahayu
,
Y. Robiah
,
R. Marliza
…
Malware detection employed by visualization and deep neural network
Authors:
Anson Pinhero
,
Anupama M L
,
Vinod P.
…
Effective classification of android malware families through dynamic features and neural networks
Authors:
Gianni D'Angelo
,
Francesco Palmieri
,
Antonio Robustelli
…
See all similar
Cited by
4
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers via Keyboard LEDs
Authors:
Mordechai Guri
,
Boris Zadov
,
Dima Bykhovsky
…
Fidelius: Protecting User Secrets from Compromised Browsers
Authors:
Jonathan Cogan
,
Saba Eskandarian
,
Dillon Franke
…
A characterisation of system-wide propagation in the malware landscape
Authors:
David Korczynski
See all cited by