Graphical Models for Security: 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers

Author:   Harley Eades III ,  Olga Gadyatskaya
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12419
ISBN:  

9783030622299


Pages:   199
Publication Date:   08 November 2020
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Graphical Models for Security: 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers


Add your own review!

Overview

This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic. The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security.  

Full Product Details

Author:   Harley Eades III ,  Olga Gadyatskaya
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2020
Volume:   12419
Weight:   0.454kg
ISBN:  

9783030622299


ISBN 10:   3030622290
Pages:   199
Publication Date:   08 November 2020
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks.- Library-based Attack Tree Synthesis.- Asset-Centric Analysis and Visualisation of Attack Trees.- An attack simulation language for the IT domain.- Representing decision-makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer.- Breaking the cyber kill chain by modelling resource costs.- GroDDViewer: Dynamic Dual View of Android Malware.- Attack-Defence Frameworks: Argumentation-based Semantics for Attack-Defence Trees.- A diagrammatic approach to information flow in encrypted communication.- Contextualisation of Data Flow Diagrams for security analysis.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List