Graphical Models for Security: 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers

Author:   George Cybenko ,  David Pym ,  Barbara Fila
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11086
ISBN:  

9783030154646


Pages:   131
Publication Date:   31 March 2019
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Graphical Models for Security: 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers


Add your own review!

Overview

This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions deal with the latest research and developments on graphical models for security.

Full Product Details

Author:   George Cybenko ,  David Pym ,  Barbara Fila
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2019
Volume:   11086
Weight:   0.454kg
ISBN:  

9783030154646


ISBN 10:   3030154645
Pages:   131
Publication Date:   31 March 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins.- Deciding the Non-Emptiness of Attack trees.- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures.- Disclosure Analysis of SQL Workflows.- On Linear Logic, Functional Programming, and Attack Trees.- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement.- A State Machine System for Insider Threat Detection. 

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List