000 | 03552nam a22006255i 4500 | ||
---|---|---|---|
001 | 978-3-030-36537-0 | ||
003 | DE-He213 | ||
005 | 20240423125000.0 | ||
007 | cr nn 008mamaa | ||
008 | 191127s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030365370 _9978-3-030-36537-0 |
||
024 | 7 |
_a10.1007/978-3-030-36537-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aGraphical Models for Security _h[electronic resource] : _b6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers / _cedited by Massimiliano Albanese, Ross Horne, Christian W. Probst. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aIX, 221 p. 188 illus., 73 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11720 |
|
505 | 0 | _aInvited Papers -- Graph Models in Tracking Behaviors for Cyber-Security -- Attack tree series: a case for dynamic attack tree analysis -- Attack Trees -- Attack trees: a notion of missing attacks -- Optimizing System Architecture Cost and Security Countermeasures -- Security Analysis of IoT systems using Attack Trees -- Attackdefense trees for abusing optical power meters: A case study and the OSEAD tool experience report -- Risk Management and Attack Graphs -- Quantifying and Analyzing Information Security Risk from Incident Data -- Poster Support for an Obeya-like Risk Management Approach -- Conceptual Abstraction of Attack Graphs - a Use Case of securiCAD -- High-level Automatic Event Detection and User Classification in a Social Network Context. | |
520 | _aThis book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited talk. The contributions deal with the latest research and developments on graphical models for security. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer science. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 0 |
_aImage processing _xDigital techniques. |
|
650 | 0 | _aComputer vision. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aTheory of Computation. |
650 | 2 | 4 | _aMathematics of Computing. |
650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
700 | 1 |
_aAlbanese, Massimiliano. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aHorne, Ross. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aProbst, Christian W. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030365363 |
776 | 0 | 8 |
_iPrinted edition: _z9783030365387 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11720 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-36537-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c172894 _d172894 |