Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment