000 | 03633nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-319-74860-3 | ||
003 | DE-He213 | ||
005 | 20240423125640.0 | ||
007 | cr nn 008mamaa | ||
008 | 180220s2018 sz | s |||| 0|eng d | ||
020 |
_a9783319748603 _9978-3-319-74860-3 |
||
024 | 7 |
_a10.1007/978-3-319-74860-3 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aGraphical Models for Security _h[electronic resource] : _b4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / _cedited by Peng Liu, Sjouke Mauw, Ketil Stolen. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXI, 147 p. 48 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v10744 |
|
505 | 0 | _aGraphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. | |
520 | _aThis book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017. The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer programming. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputers. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aProgramming Techniques. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aArtificial Intelligence. |
650 | 2 | 4 | _aComputing Milieux. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
700 | 1 |
_aLiu, Peng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMauw, Sjouke. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aStolen, Ketil. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319748597 |
776 | 0 | 8 |
_iPrinted edition: _z9783319748610 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v10744 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-74860-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c180239 _d180239 |