語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection of intrusions and malware,...
~
DIMVA (Conference) (2025 :)
FindBook
Google Book
Amazon
博客來
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part II /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Detection of intrusions and malware, and vulnerability assessment/ edited by Manuel Egele ... [et al.].
其他題名:
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
其他題名:
DIMVA 2025
其他作者:
Egele, Manuel.
團體作者:
DIMVA (Conference)
出版者:
Cham :Springer Nature Switzerland : : 2025.,
面頁冊數:
xvi, 331 p. :ill., digital ;24 cm.
內容註:
AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
Contained By:
Springer Nature eBook
標題:
Intrusion detection systems (Computer security) - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-97623-0
ISBN:
9783031976230
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part II /
Detection of intrusions and malware, and vulnerability assessment
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.Part II /[electronic resource] :DIMVA 2025edited by Manuel Egele ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xvi, 331 p. :ill., digital ;24 cm. - Lecture notes in computer science,157481611-3349 ;. - Lecture notes in computer science ;15748..
AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
ISBN: 9783031976230
Standard No.: 10.1007/978-3-031-97623-0doiSubjects--Topical Terms:
3135747
Intrusion detection systems (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25 / D55 2025
Dewey Class. No.: 005.8
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part II /
LDR
:03730nmm a2200349 a 4500
001
2413744
003
DE-He213
005
20250723071729.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031976230
$q
(electronic bk.)
020
$a
9783031976223
$q
(paper)
024
7
$a
10.1007/978-3-031-97623-0
$2
doi
035
$a
978-3-031-97623-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D55 2025
072
7
$a
UKN
$2
bicssc
072
7
$a
COM043000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D582 2025
111
2
$a
DIMVA (Conference)
$n
(22nd :
$d
2025 :
$c
Graz, Austria)
$3
3790000
245
1 0
$a
Detection of intrusions and malware, and vulnerability assessment
$h
[electronic resource] :
$b
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
$n
Part II /
$c
edited by Manuel Egele ... [et al.].
246
3
$a
DIMVA 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xvi, 331 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15748
505
0
$a
AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
520
$a
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
650
0
$a
Intrusion detection systems (Computer security)
$v
Congresses.
$3
3135747
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Crime Control and Security.
$3
3251653
650
2 4
$a
Quantum Physics.
$3
893952
700
1
$a
Egele, Manuel.
$3
3790001
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15748.
$3
3790003
856
4 0
$u
https://doi.org/10.1007/978-3-031-97623-0
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9519199
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 D55 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入