Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers /

This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited tal...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Albanese, Massimiliano (Editor, http://id.loc.gov/vocabulary/relators/edt), Horne, Ross (Editor, http://id.loc.gov/vocabulary/relators/edt), Probst, Christian W. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Series:Security and Cryptology ; 11720
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 03754nam a2200565 4500
001 978-3-030-36537-0
003 DE-He213
005 20191127181509.0
007 cr nn 008mamaa
008 191127s2019 gw | s |||| 0|eng d
020 |a 9783030365370  |9 978-3-030-36537-0 
024 7 |a 10.1007/978-3-030-36537-0  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Graphical Models for Security  |h [electronic resource] :  |b 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers /  |c edited by Massimiliano Albanese, Ross Horne, Christian W. Probst. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a IX, 221 p. 188 illus., 73 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 11720 
505 0 |a Invited Papers -- Graph Models in Tracking Behaviors for Cyber-Security -- Attack tree series: a case for dynamic attack tree analysis -- Attack Trees -- Attack trees: a notion of missing attacks -- Optimizing System Architecture Cost and Security Countermeasures -- Security Analysis of IoT systems using Attack Trees -- Attackdefense trees for abusing optical power meters: A case study and the OSEAD tool experience report -- Risk Management and Attack Graphs -- Quantifying and Analyzing Information Security Risk from Incident Data -- Poster Support for an Obeya-like Risk Management Approach -- Conceptual Abstraction of Attack Graphs - a Use Case of securiCAD -- High-level Automatic Event Detection and User Classification in a Social Network Context. 
520 |a This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited talk. The contributions deal with the latest research and developments on graphical models for security. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Computer science-Mathematics. 
650 0 |a Optical data processing. 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Theory of Computation.  |0 http://scigraph.springernature.com/things/product-market-codes/I16005 
650 2 4 |a Mathematics of Computing.  |0 http://scigraph.springernature.com/things/product-market-codes/I17001 
650 2 4 |a Computer Imaging, Vision, Pattern Recognition and Graphics.  |0 http://scigraph.springernature.com/things/product-market-codes/I22005 
700 1 |a Albanese, Massimiliano.  |e editor.  |0 (orcid)0000-0002-2675-5810  |1 https://orcid.org/0000-0002-2675-5810  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Horne, Ross.  |e editor.  |0 (orcid)0000-0003-0162-1901  |1 https://orcid.org/0000-0003-0162-1901  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Probst, Christian W.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030365363 
776 0 8 |i Printed edition:  |z 9783030365387 
830 0 |a Security and Cryptology ;  |v 11720 
856 4 0 |u https://doi.org/10.1007/978-3-030-36537-0  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)