Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/2665
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, Peng. ; editor. ;en_US
dc.contributor.authorMauw, Sjouke. ; editor. ;en_US
dc.contributor.authorStolen, Ketil. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:40Z-
dc.date.available2020-05-17T08:39:40Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319748603 ; 978-3-319-74860-3 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2665-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319748597 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.description42 ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.e The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. ;en_US
dc.description.statementofresponsibilityedited by Peng Liu, Sjouke Mauw, Ketil Stolen.en_US
dc.description.tableofcontentsGraphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. ;en_US
dc.format.extentXI, 147 p. 48 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ;en_US
dc.relation.haspart9783319748603.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer organization. ;en_US
dc.subjectComputer Programmingen_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer Securityen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputersen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectProgramming Techniquesen_US
dc.subjectSoftware Engineeen_US
dc.titleGraphical Models for Securityen_US
dc.title.alternative4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319748603.pdf10.8 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, Peng. ; editor. ;en_US
dc.contributor.authorMauw, Sjouke. ; editor. ;en_US
dc.contributor.authorStolen, Ketil. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:40Z-
dc.date.available2020-05-17T08:39:40Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319748603 ; 978-3-319-74860-3 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2665-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319748597 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.description42 ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.e The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. ;en_US
dc.description.statementofresponsibilityedited by Peng Liu, Sjouke Mauw, Ketil Stolen.en_US
dc.description.tableofcontentsGraphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. ;en_US
dc.format.extentXI, 147 p. 48 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ;en_US
dc.relation.haspart9783319748603.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer organization. ;en_US
dc.subjectComputer Programmingen_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer Securityen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputersen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectProgramming Techniquesen_US
dc.subjectSoftware Engineeen_US
dc.titleGraphical Models for Securityen_US
dc.title.alternative4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319748603.pdf10.8 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLiu, Peng. ; editor. ;en_US
dc.contributor.authorMauw, Sjouke. ; editor. ;en_US
dc.contributor.authorStolen, Ketil. ; editor. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:39:40Z-
dc.date.available2020-05-17T08:39:40Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319748603 ; 978-3-319-74860-3 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/2665-
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionPrinted edition: ; 9783319748597 ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.description005.8 ; 23 ;en_US
dc.descriptionen_US
dc.description42 ;en_US
dc.descriptionen_US
dc.description.abstractThis book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.e The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. ;en_US
dc.description.statementofresponsibilityedited by Peng Liu, Sjouke Mauw, Ketil Stolen.en_US
dc.description.tableofcontentsGraphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. ;en_US
dc.format.extentXI, 147 p. 48 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10744 ;en_US
dc.relation.haspart9783319748603.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer organization. ;en_US
dc.subjectComputer Programmingen_US
dc.subjectSoftware Engineeringen_US
dc.subjectComputer Securityen_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputersen_US
dc.subjectComputer Scienceen_US
dc.subjectSystems and Data Securityen_US
dc.subjectProgramming Techniquesen_US
dc.subjectSoftware Engineeen_US
dc.titleGraphical Models for Securityen_US
dc.title.alternative4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319748603.pdf10.8 MBAdobe PDFThumbnail
Preview File