جهت دسترسی به کاربرگه ی زیر، از این لینک استفاده کنید.
http://localhost/handle/Hannan/2665
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Liu, Peng. ; editor. ; | en_US |
| dc.contributor.author | Mauw, Sjouke. ; editor. ; | en_US |
| dc.contributor.author | Stolen, Ketil. ; editor. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:39:40Z | - |
| dc.date.available | 2020-05-17T08:39:40Z | - |
| dc.date.issued | 2018 | en_US |
| dc.identifier.isbn | 9783319748603 ; 978-3-319-74860-3 ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/2665 | - |
| dc.description | QA76.9.A25 ; | en_US |
| dc.description | Printed edition: ; 9783319748597 ; | en_US |
| dc.description | en_US | |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | en_US | |
| dc.description | 005.8 ; 23 ; | en_US |
| dc.description | en_US | |
| dc.description | 42 ; | en_US |
| dc.description | en_US | |
| dc.description.abstract | This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.e The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. ; | en_US |
| dc.description.statementofresponsibility | edited by Peng Liu, Sjouke Mauw, Ketil Stolen. | en_US |
| dc.description.tableofcontents | Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. ; | en_US |
| dc.format.extent | XI, 147 p. 48 illus. ; online resource. ; | en_US |
| dc.publisher | Springer International Publishing : | en_US |
| dc.publisher | Imprint: Springer, | en_US |
| dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ; | en_US |
| dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ; | en_US |
| dc.relation.haspart | 9783319748603.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer organization. ; | en_US |
| dc.subject | Computer Programming | en_US |
| dc.subject | Software Engineering | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Artificial Intelligence | en_US |
| dc.subject | Computers | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.subject | Programming Techniques | en_US |
| dc.subject | Software Enginee | en_US |
| dc.title | Graphical Models for Security | en_US |
| dc.title.alternative | 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Cham : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9783319748603.pdf | 10.8 MB | Adobe PDF | ![]() مشاهده فایل |
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Liu, Peng. ; editor. ; | en_US |
| dc.contributor.author | Mauw, Sjouke. ; editor. ; | en_US |
| dc.contributor.author | Stolen, Ketil. ; editor. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:39:40Z | - |
| dc.date.available | 2020-05-17T08:39:40Z | - |
| dc.date.issued | 2018 | en_US |
| dc.identifier.isbn | 9783319748603 ; 978-3-319-74860-3 ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/2665 | - |
| dc.description | QA76.9.A25 ; | en_US |
| dc.description | Printed edition: ; 9783319748597 ; | en_US |
| dc.description | en_US | |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | en_US | |
| dc.description | 005.8 ; 23 ; | en_US |
| dc.description | en_US | |
| dc.description | 42 ; | en_US |
| dc.description | en_US | |
| dc.description.abstract | This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.e The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. ; | en_US |
| dc.description.statementofresponsibility | edited by Peng Liu, Sjouke Mauw, Ketil Stolen. | en_US |
| dc.description.tableofcontents | Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. ; | en_US |
| dc.format.extent | XI, 147 p. 48 illus. ; online resource. ; | en_US |
| dc.publisher | Springer International Publishing : | en_US |
| dc.publisher | Imprint: Springer, | en_US |
| dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ; | en_US |
| dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ; | en_US |
| dc.relation.haspart | 9783319748603.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer organization. ; | en_US |
| dc.subject | Computer Programming | en_US |
| dc.subject | Software Engineering | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Artificial Intelligence | en_US |
| dc.subject | Computers | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.subject | Programming Techniques | en_US |
| dc.subject | Software Enginee | en_US |
| dc.title | Graphical Models for Security | en_US |
| dc.title.alternative | 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Cham : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9783319748603.pdf | 10.8 MB | Adobe PDF | ![]() مشاهده فایل |
نمایش کامل اطلاعات کتابشناختی
| فیلد DublinCore | مقدار | زبان |
|---|---|---|
| dc.contributor.author | Liu, Peng. ; editor. ; | en_US |
| dc.contributor.author | Mauw, Sjouke. ; editor. ; | en_US |
| dc.contributor.author | Stolen, Ketil. ; editor. ; | en_US |
| dc.date.accessioned | 2013 | en_US |
| dc.date.accessioned | 2020-05-17T08:39:40Z | - |
| dc.date.available | 2020-05-17T08:39:40Z | - |
| dc.date.issued | 2018 | en_US |
| dc.identifier.isbn | 9783319748603 ; 978-3-319-74860-3 ; | en_US |
| dc.identifier.uri | http://localhost/handle/Hannan/2665 | - |
| dc.description | QA76.9.A25 ; | en_US |
| dc.description | Printed edition: ; 9783319748597 ; | en_US |
| dc.description | en_US | |
| dc.description | SpringerLink (Online service) ; | en_US |
| dc.description | en_US | |
| dc.description | 005.8 ; 23 ; | en_US |
| dc.description | en_US | |
| dc.description | 42 ; | en_US |
| dc.description | en_US | |
| dc.description.abstract | This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.e The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. ; | en_US |
| dc.description.statementofresponsibility | edited by Peng Liu, Sjouke Mauw, Ketil Stolen. | en_US |
| dc.description.tableofcontents | Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. ; | en_US |
| dc.format.extent | XI, 147 p. 48 illus. ; online resource. ; | en_US |
| dc.publisher | Springer International Publishing : | en_US |
| dc.publisher | Imprint: Springer, | en_US |
| dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ; | en_US |
| dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ; | en_US |
| dc.relation.haspart | 9783319748603.pdf | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Computer organization. ; | en_US |
| dc.subject | Computer Programming | en_US |
| dc.subject | Software Engineering | en_US |
| dc.subject | Computer Security | en_US |
| dc.subject | Artificial Intelligence | en_US |
| dc.subject | Computers | en_US |
| dc.subject | Computer Science | en_US |
| dc.subject | Systems and Data Security | en_US |
| dc.subject | Programming Techniques | en_US |
| dc.subject | Software Enginee | en_US |
| dc.title | Graphical Models for Security | en_US |
| dc.title.alternative | 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / | en_US |
| dc.type | Book | en_US |
| dc.publisher.place | Cham : | en_US |
| مجموعه(های): | مهندسی فناوری اطلاعات | |
پیوست های این کاربرگه
| فایل | توضیحات | اندازه | فرمت | |
|---|---|---|---|---|
| 9783319748603.pdf | 10.8 MB | Adobe PDF | ![]() مشاهده فایل |
