Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers /
This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited tal...
Saved in:
Other Authors / Creators: | Albanese, Massimiliano. editor. Horne, Ross. editor. Probst, Christian W. editor. |
---|---|
Other Corporate Authors / Creators: | SpringerLink (Online service) |
Format: | Electronic eBook |
Language: | English |
Edition: | 1st ed. 2019. |
Imprint: | Cham : Springer International Publishing : Imprint: Springer, 2019. |
Series: | Security and Cryptology ;
11720 |
Subjects: | |
Online Access: | Available in Springer Computer Science eBooks 2019 English/International. |
LEADER | 03291cam a22004573i 4500 | ||
---|---|---|---|
001 | ebs23467131e | ||
003 | EBZ | ||
006 | m o d |||||| | ||
007 | cr|unu|||||||| | ||
008 | 191127s2019 sz | o |||| 0|eng d | ||
020 | |z 9783030365363 | ||
020 | |a 9783030365370 (online) | ||
035 | |a (EBZ)ebs23467131e | ||
040 | |d EBZ | ||
042 | |a msc | ||
050 | 4 | |a QA76.9.A25 | |
245 | 1 | 0 | |a Graphical Models for Security |h [electronic resource] |b 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers / |c edited by Massimiliano Albanese, Ross Horne, Christian W. Probst. |
250 | |a 1st ed. 2019. | ||
264 | 1 | |a Cham : |b Springer International Publishing : |b Imprint: Springer, |c 2019. | |
490 | 1 | |a Security and Cryptology ; |v 11720 | |
505 | 0 | |a Invited Papers -- Graph Models in Tracking Behaviors for Cyber-Security -- Attack tree series: a case for dynamic attack tree analysis -- Attack Trees -- Attack trees: a notion of missing attacks -- Optimizing System Architecture Cost and Security Countermeasures -- Security Analysis of IoT systems using Attack Trees -- Attackdefense trees for abusing optical power meters: A case study and the OSEAD tool experience report -- Risk Management and Attack Graphs -- Quantifying and Analyzing Information Security Risk from Incident Data -- Poster Support for an Obeya-like Risk Management Approach -- Conceptual Abstraction of Attack Graphs - a Use Case of securiCAD -- High-level Automatic Event Detection and User Classification in a Social Network Context. | |
520 | |a This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited talk. The contributions deal with the latest research and developments on graphical models for security. | ||
650 | 0 | |a Data protection. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Computer science—Mathematics. | |
650 | 0 | |a Image processing—Digital techniques. | |
650 | 0 | |a Computer vision. | |
650 | 1 | 4 | |a Data and Information Security. |
650 | 2 | 4 | |a Theory of Computation. |
650 | 2 | 4 | |a Mathematics of Computing. |
650 | 2 | 4 | |a Computer Imaging, Vision, Pattern Recognition and Graphics. |
700 | 1 | |a Albanese, Massimiliano. |e editor. |0 (orcid)0000-0002-2675-5810 |1 https://orcid.org/0000-0002-2675-5810 |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Horne, Ross. |e editor. |0 (orcid)0000-0003-0162-1901 |1 https://orcid.org/0000-0003-0162-1901 |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Probst, Christian W. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer Computer Science eBooks 2019 English/International |d Springer Nature | |
776 | 0 | 8 | |i Printed edition: |z 9783030365363 |
776 | 0 | 8 | |i Printed edition: |z 9783030365387 |
776 | 1 | |t Graphical Models for Security | |
830 | 0 | |a Security and Cryptology ; |v 11720 | |
856 | 4 | 0 | |3 Full text available |z Available in Springer Computer Science eBooks 2019 English/International. |u https://ezproxy.wellesley.edu/login?url=https://link.springer.com/10.1007/978-3-030-36537-0 |