My Account Log in

1 option

Graphical Models for Security : 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers / edited by Massimiliano Albanese, Ross Horne, Christian W. Probst.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Albanese, Massimiliano, Editor.
Horne, Ross, Editor.
Probst, Christian W., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11720
Security and Cryptology ; 11720
Language:
English
Subjects (All):
Data protection.
Computer science.
Computer science-Mathematics.
Image processing-Digital techniques.
Computer vision.
Data and Information Security.
Theory of Computation.
Mathematics of Computing.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Local Subjects:
Data and Information Security.
Theory of Computation.
Mathematics of Computing.
Computer Imaging, Vision, Pattern Recognition and Graphics.
Physical Description:
1 online resource (IX, 221 pages) : 188 illustrations, 73 illustrations in color.
Edition:
1st ed. 2019.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2019.
System Details:
text file PDF
Summary:
This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited talk. The contributions deal with the latest research and developments on graphical models for security.
Contents:
Invited Papers
Graph Models in Tracking Behaviors for Cyber-Security
Attack tree series: a case for dynamic attack tree analysis
Attack Trees
Attack trees: a notion of missing attacks
Optimizing System Architecture Cost and Security Countermeasures
Security Analysis of IoT systems using Attack Trees
Attackdefense trees for abusing optical power meters: A case study and the OSEAD tool experience report
Risk Management and Attack Graphs
Quantifying and Analyzing Information Security Risk from Incident Data
Poster Support for an Obeya-like Risk Management Approach
Conceptual Abstraction of Attack Graphs - a Use Case of securiCAD
High-level Automatic Event Detection and User Classification in a Social Network Context.
Other Format:
Printed edition:
ISBN:
978-3-030-36537-0
9783030365370
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account