Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9404)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: RAID 2015.
Buy print copy
About this book
The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.
Similar content being viewed by others
Keywords
- computer and communication networks
- data security
- industry sectors
- security and privacy
- telecommunications
- anomaly detection
- automata theory
- botnet tracking
- electronics
- intrusion detection systems
- keylogger
- malware analysis
- mobile security
- network security
- obfuscation
- reverse engineering
- security services
- software security
- systems security
- virtualization
Table of contents (28 papers)
-
Hardware
-
Attack Detection I
-
Web and Net
Other volumes
-
Research in Attacks, Intrusions, and Defenses
Editors and Affiliations
Bibliographic Information
Book Title: Research in Attacks, Intrusions, and Defenses
Book Subtitle: 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings
Editors: Herbert Bos, Fabian Monrose, Gregory Blanc
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-26362-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-26361-8Published: 12 December 2015
eBook ISBN: 978-3-319-26362-5Published: 26 October 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 638
Number of Illustrations: 147 illustrations in colour
Topics: Information Systems Applications (incl. Internet), Software Engineering, Algorithm Analysis and Problem Complexity, Systems and Data Security, Management of Computing and Information Systems, Computer Communication Networks