|
|
|
|
| LEADER |
03754nam a2200565 4500 |
| 001 |
978-3-030-36537-0 |
| 003 |
DE-He213 |
| 005 |
20191127181509.0 |
| 007 |
cr nn 008mamaa |
| 008 |
191127s2019 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783030365370
|9 978-3-030-36537-0
|
| 024 |
7 |
|
|a 10.1007/978-3-030-36537-0
|2 doi
|
| 040 |
|
|
|d GrThAP
|
| 050 |
|
4 |
|a QA76.9.A25
|
| 072 |
|
7 |
|a UR
|2 bicssc
|
| 072 |
|
7 |
|a COM053000
|2 bisacsh
|
| 072 |
|
7 |
|a UR
|2 thema
|
| 072 |
|
7 |
|a UTN
|2 thema
|
| 082 |
0 |
4 |
|a 005.8
|2 23
|
| 245 |
1 |
0 |
|a Graphical Models for Security
|h [electronic resource] :
|b 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers /
|c edited by Massimiliano Albanese, Ross Horne, Christian W. Probst.
|
| 250 |
|
|
|a 1st ed. 2019.
|
| 264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
| 300 |
|
|
|a IX, 221 p. 188 illus., 73 illus. in color.
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 347 |
|
|
|a text file
|b PDF
|2 rda
|
| 490 |
1 |
|
|a Security and Cryptology ;
|v 11720
|
| 505 |
0 |
|
|a Invited Papers -- Graph Models in Tracking Behaviors for Cyber-Security -- Attack tree series: a case for dynamic attack tree analysis -- Attack Trees -- Attack trees: a notion of missing attacks -- Optimizing System Architecture Cost and Security Countermeasures -- Security Analysis of IoT systems using Attack Trees -- Attackdefense trees for abusing optical power meters: A case study and the OSEAD tool experience report -- Risk Management and Attack Graphs -- Quantifying and Analyzing Information Security Risk from Incident Data -- Poster Support for an Obeya-like Risk Management Approach -- Conceptual Abstraction of Attack Graphs - a Use Case of securiCAD -- High-level Automatic Event Detection and User Classification in a Social Network Context.
|
| 520 |
|
|
|a This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited talk. The contributions deal with the latest research and developments on graphical models for security.
|
| 650 |
|
0 |
|a Computer security.
|
| 650 |
|
0 |
|a Computers.
|
| 650 |
|
0 |
|a Computer science-Mathematics.
|
| 650 |
|
0 |
|a Optical data processing.
|
| 650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
| 650 |
2 |
4 |
|a Theory of Computation.
|0 http://scigraph.springernature.com/things/product-market-codes/I16005
|
| 650 |
2 |
4 |
|a Mathematics of Computing.
|0 http://scigraph.springernature.com/things/product-market-codes/I17001
|
| 650 |
2 |
4 |
|a Computer Imaging, Vision, Pattern Recognition and Graphics.
|0 http://scigraph.springernature.com/things/product-market-codes/I22005
|
| 700 |
1 |
|
|a Albanese, Massimiliano.
|e editor.
|0 (orcid)0000-0002-2675-5810
|1 https://orcid.org/0000-0002-2675-5810
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Horne, Ross.
|e editor.
|0 (orcid)0000-0003-0162-1901
|1 https://orcid.org/0000-0003-0162-1901
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 700 |
1 |
|
|a Probst, Christian W.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783030365363
|
| 776 |
0 |
8 |
|i Printed edition:
|z 9783030365387
|
| 830 |
|
0 |
|a Security and Cryptology ;
|v 11720
|
| 856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-36537-0
|z Full Text via HEAL-Link
|
| 912 |
|
|
|a ZDB-2-SCS
|
| 912 |
|
|
|a ZDB-2-LNC
|
| 950 |
|
|
|a Computer Science (Springer-11645)
|