6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Anomaly Detection > 196-205
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Anomaly Detection > 206-223
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Emulation-Based Detection > 48-67
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Emulation-Based Detection > 68-87
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Emulation-Based Detection > 88-106
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Harnessing Context > 147-156
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Harnessing Context > 157-175
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Harnessing Context > 176-195
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Malware and SPAM > 1-20
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Malware and SPAM > 21-37
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Malware and SPAM > 38-47
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Software Diversity > 107-126
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Software Diversity > 127-146