5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised selected papers /
نام نخستين پديدآور
George Cybenko, David Pym, Barbara Fila (eds.).
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Cham, Switzerland :
نام ناشر، پخش کننده و غيره
Springer,
تاریخ نشرو بخش و غیره
2019.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource (xi, 131 pages) :
ساير جزييات
illustrations
فروست
عنوان فروست
Lecture notes in computer science ;
عنوان فروست
LNCS sublibrary. SL 4l, Security and cryptology
مشخصه جلد
11086
يادداشت کلی
متن يادداشت
Includes author index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins -- Deciding the Non-Emptiness of Attack trees -- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures -- Disclosure Analysis of SQL Workflows -- On Linear Logic, Functional Programming, and Attack Trees -- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement -- A State Machine System for Insider Threat Detection.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions deal with the latest research and developments on graphical models for security.