Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Detection of intrusions and malware,...
~
DIMVA (Conference) (2025 :)
Linked to FindBook
Google Book
Amazon
博客來
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part II /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Detection of intrusions and malware, and vulnerability assessment/ edited by Manuel Egele ... [et al.].
Reminder of title:
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
remainder title:
DIMVA 2025
other author:
Egele, Manuel.
corporate name:
DIMVA (Conference)
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xvi, 331 p. :ill., digital ;24 cm.
[NT 15003449]:
AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
Contained By:
Springer Nature eBook
Subject:
Intrusion detection systems (Computer security) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-97623-0
ISBN:
9783031976230
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part II /
Detection of intrusions and malware, and vulnerability assessment
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.Part II /[electronic resource] :DIMVA 2025edited by Manuel Egele ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xvi, 331 p. :ill., digital ;24 cm. - Lecture notes in computer science,157481611-3349 ;. - Lecture notes in computer science ;15748..
AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
ISBN: 9783031976230
Standard No.: 10.1007/978-3-031-97623-0doiSubjects--Topical Terms:
3135747
Intrusion detection systems (Computer security)
--Congresses.
LC Class. No.: QA76.9.A25 / D55 2025
Dewey Class. No.: 005.8
Detection of intrusions and malware, and vulnerability assessment = 22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.. Part II /
LDR
:03730nmm a2200349 a 4500
001
2413744
003
DE-He213
005
20250723071729.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031976230
$q
(electronic bk.)
020
$a
9783031976223
$q
(paper)
024
7
$a
10.1007/978-3-031-97623-0
$2
doi
035
$a
978-3-031-97623-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
D55 2025
072
7
$a
UKN
$2
bicssc
072
7
$a
COM043000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
D582 2025
111
2
$a
DIMVA (Conference)
$n
(22nd :
$d
2025 :
$c
Graz, Austria)
$3
3790000
245
1 0
$a
Detection of intrusions and malware, and vulnerability assessment
$h
[electronic resource] :
$b
22nd International Conference, DIMVA 2025, Graz, Austria, July 9-11, 2025 : proceedings.
$n
Part II /
$c
edited by Manuel Egele ... [et al.].
246
3
$a
DIMVA 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xvi, 331 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15748
505
0
$a
AI/ML & Security. -- Towards Explainable Drift Detection and Early Retrain in ML-based Malware Detection Pipelines. -- InferONNX: Practical and Privacy-preserving Machine Learning Inference using Trusted Execution Environments. -- Hiding in Plain Sight: On the Robustness of AI-generated code detection. -- FlexGE: Towards Secure and Flexible Model Partition for Deep Neural Networks. -- Poster: Exploring the Zero-Shot Potential of Large Language Models for Detecting Algorithmically Generated Domains. -- Poster: Using Machine Learning to Infer Network Structure from Security Metadata. -- Android & Patches. -- More Than You Signed Up For: Exposing Gaps in the Validation of Android's App Signing. -- An Empirical Study of Multi-Language Security Patches in Open Source Software. -- Red Light for Security: Uncovering Feature Check and Access Control Gaps in AAOS. -- Poster: SPECK: From Google Textual Guidelines to Automatic Detection of Android Apps Vulnerabilities. -- OS & Network. -- Taming the Linux Memory Allocator for Rapid Prototyping. -- Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation. -- Overlapping data in network protocols: bridging OS and NIDS reassembly gap. -- Poster: On the Usage of Kernel Shadow Stacks for User-Level Programs. -- Referencing your Privileges - A Data-Only Exploit Technique for the Windows Kernel. -- Resilient Systems. -- PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. -- A History of Greed: Practical Symbolic Execution for Ethereum Smart Contracts. -- FAULTLESS: Flexible and Transparent Fault Protection for Superscalar RISC-V Processors. -- Poster: Building Confidence in Hardware-based Ransomware Detection through Hardware Performance Counter Event Correlation. -- Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning.
520
$a
The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9-11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.
650
0
$a
Intrusion detection systems (Computer security)
$v
Congresses.
$3
3135747
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Crime Control and Security.
$3
3251653
650
2 4
$a
Quantum Physics.
$3
893952
700
1
$a
Egele, Manuel.
$3
3790001
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15748.
$3
3790003
856
4 0
$u
https://doi.org/10.1007/978-3-031-97623-0
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9519199
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 D55 2025
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login