Muutke küpsiste eelistusi

Graphical Models for Security: 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers 2019 ed. [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 221 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 73 Illustrations, color; 115 Illustrations, black and white; IX, 221 p. 188 illus., 73 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 11720
  • Ilmumisaeg: 28-Nov-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030365360
  • ISBN-13: 9783030365363
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 221 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 73 Illustrations, color; 115 Illustrations, black and white; IX, 221 p. 188 illus., 73 illus. in color., 1 Paperback / softback
  • Sari: Security and Cryptology 11720
  • Ilmumisaeg: 28-Nov-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030365360
  • ISBN-13: 9783030365363
This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. 







The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited talk. The contributions deal with the latest research and developments on graphical models for security.
Invited Papers.- Graph Models in Tracking Behaviors for Cyber-Security.- Attack tree series: a case for dynamic attack tree analysis.- Attack Trees.- Attack trees: a notion of missing attacks.- Optimizing System Architecture Cost and Security Countermeasures.- Security Analysis of IoT systems using Attack Trees.- Attackdefense trees for abusing optical power meters: A case study and the OSEAD tool experience report.- Risk Management and Attack Graphs.- Quantifying and Analyzing Information Security Risk from Incident Data.- Poster Support for an Obeya-like Risk Management Approach.- Conceptual Abstraction of Attack Graphs - a Use Case of securiCAD.- High-level Automatic Event Detection and User Classi?cation in a Social Network Context.