Muutke küpsiste eelistusi

Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 Proceedings 2000 ed. [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 230 pages, kõrgus x laius: 235x155 mm, kaal: 770 g, X, 230 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 1907
  • Ilmumisaeg: 20-Sep-2000
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540410856
  • ISBN-13: 9783540410850
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 230 pages, kõrgus x laius: 235x155 mm, kaal: 770 g, X, 230 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 1907
  • Ilmumisaeg: 20-Sep-2000
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540410856
  • ISBN-13: 9783540410850
Teised raamatud teemal:
Since 1998, RAID has established its reputation as the main event in research on intrusion detection, both in Europe and the United States. Every year, RAID gathers researchers, security vendors and security practitioners to listen to the most recent research results in the area as well as experiments and deployment issues. This year, RAID has grown one step further to establish itself as a well-known event in the security community, with the publication of hardcopy proceedings. RAID 2000 received 26 paper submissions from 10 countries and 3 continents. The program committee selected 14 papers for publication and examined 6 of them for presentation. In addition RAID 2000 received 30 extended abstracts proposals; 15 of these extended abstracts were accepted for presentation. - tended abstracts are available on the website of the RAID symposium series, http://www.raid-symposium.org/. We would like to thank the technical p- gram committee for the help we received in reviewing the papers, as well as all the authors for their participation and submissions, even for those rejected. As in previous RAID symposiums, the program alternates between fun- mental research issues, such as newtechnologies for intrusion detection, and more practical issues linked to the deployment and operation of intrusion det- tion systems in a real environment. Five sessions have been devoted to intrusion detection technology, including modeling, data mining and advanced techniques.

Muu info

Springer Book Archives
Logging Better Logging through Formality 1(16) Chapman Flack Mikhail J. Atallah A Pattern Matching Based Filter for Audit Reduction and Fast Detection of Potential Intrusions 17(11) Josue Kuri Gonzalo Navarro Ludovic Me Laurent Heye Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection 28(21) Joachim Biskup Ulrich Flegel Data Mining A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions 49(17) Wenke Lee Rahul A. Nimbalkar Kam K. Yee Sunil B. Patil Pragneshkumar H. Desai Thuan T. Tran Salvatore J. Stolfo Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report 66(14) Christoph Michael Anup Ghosh Modeling Process Behavior Adaptive, Model-Based Monitoring for Cyber Attack Detection 80(13) Alfonso Valdes Keith Skinner A Real-Time Intrusion Detection System Based on Learning Program Behavior 93(17) Anup K. Ghosh Christoph Michael Michael Schatz Intrusion Detection Using Variable-Length Audit Trail Patterns 110(20) Andreas Wespi Marc Dacier Herve Debar Flexible Intrusion Detection Using Variable-Length Behavior Modeling in Distributed Environment: Application to CORBA Objects 130(15) Zakia Marrakchi Ludovic Me Bernard Vivinis Benjamin Morin IDS Evaluation The 1998 Lincoln Laboratory IDS Evaluation (A Critique) 145(17) John McHugh Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation 162(21) Richard Lippmann Joshua W. Haines David J. Fried Jonathan Korba Kumar Das Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems 183(14) Dominique Alessandri Modeling LAMBDA: A Language to Model a Database for Detection of Attacks 197(20) Frederic Cuppens Rodolphe Ortalo Target Naming and Service Apoptosis 217(10) James Riordan Dominique Alessandri Author Index 227