↓ Skip to main content

Detection of intrusions and malware, and vulnerability assessment

Overview of attention for book
Cover of 'Detection of intrusions and malware, and vulnerability assessment'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Detection of Intrusions and Malware, and Vulnerability Assessment
  3. Altmetric Badge
    Chapter 2 “Nice Boots!” - A Large-Scale Analysis of Bootkits and New Ways to Stop Them
  4. Altmetric Badge
    Chapter 3 C5: Cross-Cores Cache Covert Channel
  5. Altmetric Badge
    Chapter 4 Intrusion Detection for Airborne Communication Using PHY-Layer Information
  6. Altmetric Badge
    Chapter 5 That Ain’t You: Blocking Spearphishing Through Behavioral Modelling
  7. Altmetric Badge
    Chapter 6 Robust and Effective Malware Detection Through Quantitative Data Flow Graph Metrics
  8. Altmetric Badge
    Chapter 7 Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries
  9. Altmetric Badge
    Chapter 8 Fine-Grained Control-Flow Integrity Through Binary Hardening
  10. Altmetric Badge
    Chapter 9 Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software
  11. Altmetric Badge
    Chapter 10 The Role of Cloud Services in Malicious Software: Trends and Insights
  12. Altmetric Badge
    Chapter 11 Capturing DDoS Attack Dynamics Behind the Scenes
  13. Altmetric Badge
    Chapter 12 Quit playing games with my heart: Understanding online dating scams
  14. Altmetric Badge
    Chapter 13 More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations
  15. Altmetric Badge
    Chapter 14 May I? - Content Security Policy Endorsement for Browser Extensions
  16. Altmetric Badge
    Chapter 15 On the Security and Engineering Implications of Finer-Grained Access Controls for Android Developers and Users
  17. Altmetric Badge
    Chapter 16 Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network
  18. Altmetric Badge
    Chapter 17 Controlled Data Sharing for Collaborative Predictive Blacklisting
Attention for Chapter 11: Capturing DDoS Attack Dynamics Behind the Scenes
Altmetric Badge

Citations

dimensions_citation
11 Dimensions

Readers on

mendeley
18 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Capturing DDoS Attack Dynamics Behind the Scenes
Chapter number 11
Book title
Detection of Intrusions and Malware, and Vulnerability Assessment
Published by
Springer, Cham, July 2015
DOI 10.1007/978-3-319-20550-2_11
Book ISBNs
978-3-31-920549-6, 978-3-31-920550-2
Authors

An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 18 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 1 6%
Unknown 17 94%

Demographic breakdown

Readers by professional status Count As %
Student > Master 4 22%
Student > Ph. D. Student 3 17%
Student > Doctoral Student 2 11%
Student > Bachelor 2 11%
Professor 1 6%
Other 3 17%
Unknown 3 17%
Readers by discipline Count As %
Computer Science 12 67%
Earth and Planetary Sciences 1 6%
Engineering 1 6%
Unknown 4 22%