5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised selected papers /
First Statement of Responsibility
George Cybenko, David Pym, Barbara Fila (eds.).
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2019.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource (xi, 131 pages) :
Other Physical Details
illustrations
SERIES
Series Title
Lecture notes in computer science ;
Series Title
LNCS sublibrary. SL 4l, Security and cryptology
Volume Designation
11086
GENERAL NOTES
Text of Note
Includes author index.
CONTENTS NOTE
Text of Note
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins -- Deciding the Non-Emptiness of Attack trees -- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures -- Disclosure Analysis of SQL Workflows -- On Linear Logic, Functional Programming, and Attack Trees -- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement -- A State Machine System for Insider Threat Detection.
0
SUMMARY OR ABSTRACT
Text of Note
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions deal with the latest research and developments on graphical models for security.