Cantitate/Preț
Produs

Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers: Lecture Notes in Computer Science, cartea 9987

Editat de Barbara Kordy, Mathias Ekstedt, Dong Seong Kim
en Limba Engleză Paperback – 8 sep 2016
This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016.
The 9 papers presented in this volume were carefully reviewed and selected from 23 submissions. The volume also contains the invited talk by Xinming Ou. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage. 
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32664 lei

Preț vechi: 40830 lei
-20% Nou

Puncte Express: 490

Preț estimativ în valută:
6251 6449$ 5291£

Carte tipărită la comandă

Livrare economică 05-19 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319462622
ISBN-10: 3319462628
Pagini: 182
Ilustrații: IX, 167 p. 62 illus.
Dimensiuni: 155 x 235 x 10 mm
Greutate: 0.26 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

A Bottom-up Approach to Applying Graphical Models in Security Analysis.- On the Soundness of Attack Trees.- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment.- Differential Privacy Analysis of Data Processing Workflows.- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.- Enterprise Architecture-Based Risk and Security Modelling and Analysis.- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation.- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis.- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack.- Confining Adversary Actions via Measurement.