Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/dimva/dimva2014.bht:"
@inproceedings{DBLP:conf/dimva/AndriesseB14, author = {Dennis Andriesse and Herbert Bos}, editor = {Sven Dietrich}, title = {Instruction-Level Steganography for Covert Trigger-Based Malware - (Extended Abstract)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {41--50}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_3}, doi = {10.1007/978-3-319-08509-8\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/AndriesseB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/BaraboschEG14, author = {Thomas Barabosch and Sebastian Eschweiler and Elmar Gerhards{-}Padilla}, editor = {Sven Dietrich}, title = {Bee Master: Detecting Host-Based Code Injection Attacks}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {235--254}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_13}, doi = {10.1007/978-3-319-08509-8\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/BaraboschEG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/GiuffridaMCB14, author = {Cristiano Giuffrida and Kamil Majdanik and Mauro Conti and Herbert Bos}, editor = {Sven Dietrich}, title = {I Sensed It Was You: Authenticating Mobile Users with Sensor-Enhanced Keystroke Dynamics}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {92--111}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_6}, doi = {10.1007/978-3-319-08509-8\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/GiuffridaMCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KurmusDK14, author = {Anil Kurmus and Sergej Dechand and R{\"{u}}diger Kapitza}, editor = {Sven Dietrich}, title = {Quantifiable Run-Time Kernel Attack Surface Reduction}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {212--234}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_12}, doi = {10.1007/978-3-319-08509-8\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KurmusDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LindorferVSNAMPZI14, author = {Martina Lindorfer and Stamatis Volanis and Alessandro Sisto and Matthias Neugschwandtner and Elias Athanasopoulos and Federico Maggi and Christian Platzer and Stefano Zanero and Sotiris Ioannidis}, editor = {Sven Dietrich}, title = {AndRadar: Fast Discovery of Android Applications in Alternative Markets}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {51--71}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_4}, doi = {10.1007/978-3-319-08509-8\_4}, timestamp = {Thu, 24 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/LindorferVSNAMPZI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MaioKSKV14, author = {Giancarlo De Maio and Alexandros Kapravelos and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna}, editor = {Sven Dietrich}, title = {PExy: The Other Side of Exploit Kits}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {132--151}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_8}, doi = {10.1007/978-3-319-08509-8\_8}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MaioKSKV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/MohaisenA14, author = {Aziz Mohaisen and Omar Alrawi}, editor = {Sven Dietrich}, title = {AV-Meter: An Evaluation of Antivirus Scans and Labels}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {112--131}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_7}, doi = {10.1007/978-3-319-08509-8\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/MohaisenA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/RietzVSK14, author = {Ren{\'{e}} Rietz and Michael Vogel and Franka Schuster and Hartmut K{\"{o}}nig}, editor = {Sven Dietrich}, title = {Parallelization of Network Intrusion Detection Systems under Attack Conditions}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {172--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_10}, doi = {10.1007/978-3-319-08509-8\_10}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/RietzVSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/RuttenbergMKNHLLP14, author = {Brian E. Ruttenberg and Craig Miles and Lee Kellogg and Vivek Notani and Michael Howard and Charles LeDoux and Arun Lakhotia and Avi Pfeffer}, editor = {Sven Dietrich}, title = {Identifying Shared Software Components to Support Malware Forensics}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {21--40}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_2}, doi = {10.1007/978-3-319-08509-8\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/RuttenbergMKNHLLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SchiavoniMCZ14, author = {Stefano Schiavoni and Federico Maggi and Lorenzo Cavallaro and Stefano Zanero}, editor = {Sven Dietrich}, title = {Phoenix: DGA-Based Botnet Tracking and Intelligence}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {192--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_11}, doi = {10.1007/978-3-319-08509-8\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/SchiavoniMCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/SlowinskaHBBB14, author = {Asia Slowinska and Istv{\'{a}}n Haller and Andrei Bacs and Silviu Baranga and Herbert Bos}, editor = {Sven Dietrich}, title = {Data Structure Archaeology: Scrape Away the Dirt and Glue Back the Pieces! - (Or: Automated Techniques to Recover Split and Merged Variables)}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {1--20}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_1}, doi = {10.1007/978-3-319-08509-8\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dimva/SlowinskaHBBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WangSL14, author = {Tielei Wang and Chengyu Song and Wenke Lee}, editor = {Sven Dietrich}, title = {Diagnosis and Emergency Patch Generation for Integer Overflow Exploits}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {255--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_14}, doi = {10.1007/978-3-319-08509-8\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WangSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/WestM14, author = {Andrew G. West and Aziz Mohaisen}, editor = {Sven Dietrich}, title = {Metadata-Driven Threat Classification of Network Endpoints Appearing in Malware}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {152--171}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_9}, doi = {10.1007/978-3-319-08509-8\_9}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/WestM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ZhangD14, author = {Xiao Zhang and Wenliang Du}, editor = {Sven Dietrich}, title = {Attacks on Android Clipboard}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, pages = {72--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8\_5}, doi = {10.1007/978-3-319-08509-8\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ZhangD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dimva/2014, editor = {Sven Dietrich}, title = {Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, {DIMVA} 2014, Egham, UK, July 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8550}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08509-8}, doi = {10.1007/978-3-319-08509-8}, isbn = {978-3-319-08508-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.