Detection of intrusions and malware,...
DIMVA (Conference) (2025 :)

FindBook      Google Book      Amazon      博客來     
  • Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Detection of intrusions and malware, and vulnerability assessment/ edited by Manuel Egele ... [et al.].
    其他題名: 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
    其他題名: DIMVA 2025
    其他作者: Egele, Manuel.
    團體作者: DIMVA (Conference)
    出版者: Cham :Springer Nature Switzerland : : 2025.,
    面頁冊數: xvi, 331 p. :ill., digital ;24 cm.
    內容註: AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
    Contained By: Springer Nature eBook
    標題: Intrusion detection systems (Computer security) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-97623-0
    ISBN: 9783031976230
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9519199 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 D55 2025 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入