|
|
|
|
LEADER |
03834nam a2200625 4500 |
001 |
978-3-030-15465-3 |
003 |
DE-He213 |
005 |
20191024172008.0 |
007 |
cr nn 008mamaa |
008 |
190330s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030154653
|9 978-3-030-15465-3
|
024 |
7 |
|
|a 10.1007/978-3-030-15465-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Graphical Models for Security
|h [electronic resource] :
|b 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers /
|c edited by George Cybenko, David Pym, Barbara Fila.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XI, 131 p. 56 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11086
|
505 |
0 |
|
|a Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins -- Deciding the Non-Emptiness of Attack trees -- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures -- Disclosure Analysis of SQL Workflows -- On Linear Logic, Functional Programming, and Attack Trees -- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement -- A State Machine System for Insider Threat Detection. .
|
520 |
|
|
|a This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions deal with the latest research and developments on graphical models for security.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Programming languages (Electronic computers).
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Law and legislation.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Artificial Intelligence.
|0 http://scigraph.springernature.com/things/product-market-codes/I21000
|
650 |
2 |
4 |
|a Computer Crime.
|0 http://scigraph.springernature.com/things/product-market-codes/I28070
|
650 |
2 |
4 |
|a Programming Techniques.
|0 http://scigraph.springernature.com/things/product-market-codes/I14010
|
650 |
2 |
4 |
|a Programming Languages, Compilers, Interpreters.
|0 http://scigraph.springernature.com/things/product-market-codes/I14037
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I24059
|
700 |
1 |
|
|a Cybenko, George.
|e editor.
|0 (orcid)0000-0001-7734-2912
|1 https://orcid.org/0000-0001-7734-2912
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Pym, David.
|e editor.
|0 (orcid)0000-0002-6504-5838
|1 https://orcid.org/0000-0002-6504-5838
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Fila, Barbara.
|e editor.
|0 (orcid)0000-0002-1824-7621
|1 https://orcid.org/0000-0002-1824-7621
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030154646
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030154660
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11086
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-15465-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|