Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016. The 9 papers presented in this volume were carefully reviewed and selected from 23 submissions. The volume also contains the invited talk by Xinming Ou. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.
This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016. The 9 papers presented in this volume were carefully reviewed and selected from 23 submissions. The volume also contains the invited talk by Xinming Ou. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
A Bottom-up Approach to Applying Graphical Models in Security Analysis.- On the Soundness of Attack Trees.- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment.- Differential Privacy Analysis of Data Processing Workflows.- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.- Enterprise Architecture-Based Risk and Security Modelling and Analysis.- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation.- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis.- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack.- Confining Adversary Actions via Measurement.
A Bottom-up Approach to Applying Graphical Models in Security Analysis.- On the Soundness of Attack Trees.- The Right Tool for the Job: a Case for Common Input Scenarios for Security Assessment.- Differential Privacy Analysis of Data Processing Workflows.- Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees.- Enterprise Architecture-Based Risk and Security Modelling and Analysis.- From A to Z: Developing a Visual Vocabulary for Information Security Threat Visualisation.- Quantitative Attack Tree Analysis: Stochastic Bounds and Numerical Analysis.- Survivability Analysis of a Computer System under an Advanced Persistent Threat Attack.- Confining Adversary Actions via Measurement.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826