Cantitate/Preț
Produs

Graphical Models for Security: 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers: Lecture Notes in Computer Science, cartea 12419

Editat de Harley Eades III, Olga Gadyatskaya
en Limba Engleză Paperback – 8 noi 2020
This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic.
The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security.
 
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32827 lei

Preț vechi: 41034 lei
-20% Nou

Puncte Express: 492

Preț estimativ în valută:
6282 6519$ 5251£

Carte tipărită la comandă

Livrare economică 15-29 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783030622299
ISBN-10: 3030622290
Pagini: 199
Ilustrații: XII, 199 p. 187 illus., 56 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.3 kg
Ediția:1st ed. 2020
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks.- Library-based Attack Tree Synthesis.- Asset-Centric Analysis and Visualisation of Attack Trees.- An attack simulation language for the IT domain.- Representing decision-makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer.- Breaking the cyber kill chain by modelling resource costs.- GroDDViewer: Dynamic Dual View of Android Malware.- Attack-Defence Frameworks: Argumentation-based Semantics for Attack-Defence Trees.- A diagrammatic approach to information flow in encrypted communication.- Contextualisation of Data Flow Diagrams for security analysis.