Recent Advances in Intrusion Detection

6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings (Lecture Notes in Computer Science)

1 edition
Locate

My Reading Lists:

Create a new list



Buy this book

Last edited by MARC Bot
May 25, 2025 | History

Recent Advances in Intrusion Detection

6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings (Lecture Notes in Computer Science)

1 edition

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the Sixth Symposium on Recent Advances in Intrusion Detection (RAID 2003). Theprogramcommitteereceived44fullpapersubmissionsfrom10countries. All submissions were carefully reviewed by at least three program committee members or additional intrusion detection experts according to the criteria of scienti?c novelty, importance to the ?eld, and technical quality. The program committee meeting was held in Berkeley, USA on May 14–15. Thirteen papers were selected for presentation and publication in the conference proceedings. The conference technical program included both fundamental research and practical issues, and was shaped around the following topics: network infr- tructure, anomaly detection, correlation, modeling and speci?cation, and sensor technologies. The slides presented by the authors are available on the RAID 2003 web site, http://www.raid-symposium.org/raid2003. We would like to thank the authors that submitted papers as well as the p- gram committee members and the additional reviewers who volunteered their time to create a quality program. In addition, we want to thank the Conf- ence General Chair, John McHugh, for organizing the conference in Pittsburgh, Joshua Haines for publicizing the conference, Don McGillen for ?nding support from our sponsors, and Christopher Kruegel for maintaining the RAID web site and preparing the conference proceedings. Special thanks go to our sponsors Cisco Systems and Symantec, who p- vided ?nancial support for student participation to the symposium, and to CERT/CMU for hosting the conference.

Publish Date
Publisher
Springer
Language
English
Pages
239

Buy this book

Book Details


First Sentence

"Distributed Denial of Service (DDoS) attacks originate from multiple slave machines, each previously compromised by a worm or worm-like behavior [1]."

Classifications

Library of Congress
QA76.9.A25 R34 2003, QA76.9.M3

The Physical Object

Format
Paperback
Number of pages
239
Dimensions
9.1 x 6.1 x 0.6 inches
Weight
15.2 ounces

Edition Identifiers

Open Library
OL9359885M
ISBN 10
3540408789
ISBN 13
9783540408789
LCCN
2003057051
OCLC/WorldCat
52901600
LibraryThing
7240329
Goodreads
4259130

Work Identifiers

Work ID
OL18359108W

Community Reviews (0)

No community reviews have been submitted for this work.

Lists

History

Download catalog record: RDF / JSON
May 25, 2025 Edited by MARC Bot import existing book
August 19, 2020 Edited by ImportBot import existing book
February 5, 2019 Created by MARC Bot import existing book