Muutke küpsiste eelistusi

Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers 1st ed. 2016 [Pehme köide]

Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 167 pages, kõrgus x laius: 235x155 mm, kaal: 2818 g, 62 Illustrations, black and white; IX, 167 p. 62 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 9987
  • Ilmumisaeg: 08-Sep-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319462628
  • ISBN-13: 9783319462622
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 167 pages, kõrgus x laius: 235x155 mm, kaal: 2818 g, 62 Illustrations, black and white; IX, 167 p. 62 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 9987
  • Ilmumisaeg: 08-Sep-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319462628
  • ISBN-13: 9783319462622

This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016.
The 9 papers presented in this volume were carefully reviewed and selected from 23 submissions. The volume also contains the invited talk by Xinming Ou. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage. 

A Bottom-up Approach to Applying Graphical Models in Security Analysis.-
On the Soundness of Attack Trees.- The Right Tool for the Job: a Case for
Common Input Scenarios for Security Assessment.- Differential Privacy
Analysis of Data Processing Workflows.- Bridging Two Worlds: Reconciling
Practical Risk Assessment Methodologies with Theory of Attack Trees.-
Enterprise Architecture-Based Risk and Security Modelling and Analysis.- From
A to Z: Developing a Visual Vocabulary for Information Security Threat
Visualisation.- Quantitative Attack Tree Analysis: Stochastic Bounds and
Numerical Analysis.- Survivability Analysis of a Computer System under an
Advanced Persistent Threat Attack.- Confining Adversary Actions via
Measurement.