Muutke küpsiste eelistusi

Graphical Models for Security: 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers 1st ed. 2020 [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 199 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 56 Illustrations, color; 131 Illustrations, black and white; XII, 199 p. 187 illus., 56 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 12419
  • Ilmumisaeg: 08-Nov-2020
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030622290
  • ISBN-13: 9783030622299
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 199 pages, kõrgus x laius: 235x155 mm, kaal: 454 g, 56 Illustrations, color; 131 Illustrations, black and white; XII, 199 p. 187 illus., 56 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 12419
  • Ilmumisaeg: 08-Nov-2020
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030622290
  • ISBN-13: 9783030622299
This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic.





The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security.





 
Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks.- Library-based Attack Tree Synthesis.- Asset-Centric Analysis and Visualisation of Attack Trees.- An attack simulation language for the IT domain.- Representing decision-makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer.- Breaking the cyber kill chain by modelling resource costs.- GroDDViewer: Dynamic Dual View of Android Malware.- Attack-Defence Frameworks: Argumentation-based Semantics for Attack-Defence Trees.- A diagrammatic approach to information flow in encrypted communication.- Contextualisation of Data Flow Diagrams for security analysis.