DocumentCode :
2517267
Title :
[Title page i]
fYear :
2011
fDate :
6-6 July 2011
Abstract :
The following topics are dealt with: phylogenetic-inspired techniques; malware family detection; insufficient access control detection; I/O attacks; CAPTCHuring automated phone attacks; malicious infrastructure outsourcing; security demarcation; MINESTONE architecture; free secure network systems group; econometric models; computer security data; trustworthy architecture; wireless industrial sensor network; system security research mapping; cybercrime landscape exploration; CrySys laboratory security and privacy research roadmap; malware-resistant networking environments; security measurements; trustworthy ICT; secure microkernel-based operating system; machine learning; SPARCHS Project; software security; and malicious Web site detection.
Keywords :
Web sites; authorisation; data privacy; input-output programs; invasive software; learning (artificial intelligence); mobile computing; operating system kernels; software architecture; wireless sensor networks; CAPTCHuring automated phone attacks; CrySys laboratory security and privacy research roadmap; I/O attacks; MINESTONE architecture; SPARCHS Project; computer security data; cybercrime landscape exploration; econometric models; free secure network systems group; insufficient access control detection; machine learning; malicious Web site detection; malicious infrastructure outsourcing; malware family detection; malware-resistant networking environments; phylogenetic-inspired techniques; secure microkernel-based operating system; security demarcation; security measurements; software security; system security research mapping; trustworthy ICT; trustworthy architecture; wireless industrial sensor network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
SysSec Workshop (SysSec), 2011 First
Conference_Location :
Amsterdam
Print_ISBN :
978-1-4577-1528-0
Type :
conf
DOI :
10.1109/SysSec.2011.1
Filename :
6092749
Link To Document :
بازگشت