My Account Log in

1 option

Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / edited by Peng Liu, Sjouke Mauw, Ketil Stolen.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Liu, Peng, Editor.
Mauw, S., Editor.
Stølen, Ketil, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10744
Security and Cryptology ; 10744
Language:
English
Subjects (All):
Data protection.
Computer programming.
Software engineering.
Artificial intelligence.
Computers.
Computer engineering.
Computer networks.
Data and Information Security.
Programming Techniques.
Software Engineering.
Artificial Intelligence.
Computing Milieux.
Computer Engineering and Networks.
Local Subjects:
Data and Information Security.
Programming Techniques.
Software Engineering.
Artificial Intelligence.
Computing Milieux.
Computer Engineering and Networks.
Physical Description:
1 online resource (XI, 147 pages) : 48 illustrations
Edition:
1st ed. 2018.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017. The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security.
Contents:
Graphical modeling of Security Arguments: Current State and Future Directions
Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide
Visualizing Cyber Security Risks with Bow-Tie Diagrams
CSIRA: A method for analysing the risk of cybersecurity incidents
Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata
Probabilistic Modeling of Insider Threat Detection Systems
Security Modeling for Embedded System Design
Circle of Health Based Access Control for Personal Health Information Systems
New Directions in Attack Tree Research: Catching up with Industrial Needs
Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach.
Other Format:
Printed edition:
ISBN:
978-3-319-74860-3
9783319748603
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account