Proceedings of the 3rd European Conference on Computer Network Defense - Siris, Vasilios / Ioannidis, Sotiris / Anagnostakis, Kostas / Trimintzios, Panagiotis (ed.)
134,99 €
versandkostenfrei*

inkl. MwSt.
Sofort lieferbar
67 °P sammeln
    Gebundenes Buch

The European Conference on Computer and Network Defense draws contributions and participation both from academia and industry, and addresses security from multiple perspectives, including state-of-the-art research in computer network security, intrusion detection, denial-of-service, privacy protection, security policies, and incident response & management. The conference is organized jointly by the Institute of Computer Science of the Foundation for Research and Technology - Hellas (FORTH) and the European Network and Information Security Agency (ENISA). …mehr

Produktbeschreibung
The European Conference on Computer and Network Defense draws contributions and participation both from academia and industry, and addresses security from multiple perspectives, including state-of-the-art research in computer network security, intrusion detection, denial-of-service, privacy protection, security policies, and incident response & management. The conference is organized jointly by the Institute of Computer Science of the Foundation for Research and Technology - Hellas (FORTH) and the European Network and Information Security Agency (ENISA).
  • Produktdetails
  • Lecture Notes in Electrical Engineering 30
  • Verlag: Springer / Springer US / Springer, Berlin
  • Artikelnr. des Verlages: 12094776
  • Erscheinungstermin: 4. Dezember 2008
  • Englisch
  • Abmessung: 241mm x 160mm x 14mm
  • Gewicht: 436g
  • ISBN-13: 9780387855547
  • ISBN-10: 0387855548
  • Artikelnr.: 24866908
Inhaltsangabe
Tales from the Crypt: Fingerprinting Attacks on Encrypted Channels by Way of Retainting.- Towards High Assurance Networks of Virtual Machines.- Intrusion Detection Using Cost-Sensitive Classification.- A Novel Approach for Anomaly Detection over High-Speed Networks.- Elastic Block Ciphers in Practice: Constructions and Modes of Encryption.- Vulnerability Response Decision Assistance.- Alice, What Did You Do Last Time? Fighting Phishing Using Past Activity Tests.- QuiGon: The First Tool Against Clone Attack on Internet Relay Chat.- Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction.- ISi-LANA - A Secure Basic Architecture for Networks Connected to the Internet.