Atjaunināt sīkdatņu piekrišanu

Graphical Models for Security: Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers 1st ed. 2016 [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 167 pages, height x width: 235x155 mm, weight: 2818 g, 62 Illustrations, black and white; IX, 167 p. 62 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9987
  • Izdošanas datums: 08-Sep-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319462628
  • ISBN-13: 9783319462622
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 167 pages, height x width: 235x155 mm, weight: 2818 g, 62 Illustrations, black and white; IX, 167 p. 62 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9987
  • Izdošanas datums: 08-Sep-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319462628
  • ISBN-13: 9783319462622

This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016.
The 9 papers presented in this volume were carefully reviewed and selected from 23 submissions. The volume also contains the invited talk by Xinming Ou. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage. 

A Bottom-up Approach to Applying Graphical Models in Security Analysis.-
On the Soundness of Attack Trees.- The Right Tool for the Job: a Case for
Common Input Scenarios for Security Assessment.- Differential Privacy
Analysis of Data Processing Workflows.- Bridging Two Worlds: Reconciling
Practical Risk Assessment Methodologies with Theory of Attack Trees.-
Enterprise Architecture-Based Risk and Security Modelling and Analysis.- From
A to Z: Developing a Visual Vocabulary for Information Security Threat
Visualisation.- Quantitative Attack Tree Analysis: Stochastic Bounds and
Numerical Analysis.- Survivability Analysis of a Computer System under an
Advanced Persistent Threat Attack.- Confining Adversary Actions via
Measurement.