000826457 000__ 03417cam\a2200553Ii\4500 000826457 001__ 826457 000826457 005__ 20230306144403.0 000826457 006__ m\\\\\o\\d\\\\\\\\ 000826457 007__ cr\cn\nnnunnun 000826457 008__ 180227s2018\\\\sz\a\\\\o\\\\\101\0\eng\d 000826457 019__ $$a1029091358$$a1030291377 000826457 020__ $$a9783319748603$$q(electronic book) 000826457 020__ $$a3319748602$$q(electronic book) 000826457 020__ $$z9783319748597 000826457 0247_ $$a10.1007/978-3-319-74860-3$$2doi 000826457 035__ $$aSP(OCoLC)on1025327858 000826457 035__ $$aSP(OCoLC)1025327858$$z(OCoLC)1029091358$$z(OCoLC)1030291377 000826457 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dAZU$$dUAB$$dOCLCF$$dUPM$$dOCLCO$$dMERER$$dOCLCQ$$dOCLCA 000826457 049__ $$aISEA 000826457 050_4 $$aQA76.9.A25 000826457 08204 $$a005.8$$223 000826457 1112_ $$aGraMSec (Workshop)$$n(4th :$$d2017 :$$cSanta Barbara, Calif.) 000826457 24510 $$aGraphical models for security :$$b4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised selected papers /$$cPeng Liu, Sjouke Mauw, Ketil Stølen (eds.). 000826457 2463_ $$aGraMSec 2017 000826457 264_1 $$aCham :$$bSpringer,$$c2018. 000826457 300__ $$a1 online resource (xi, 147 pages) :$$billustrations. 000826457 336__ $$atext$$btxt$$2rdacontent 000826457 337__ $$acomputer$$bc$$2rdamedia 000826457 338__ $$aonline resource$$bcr$$2rdacarrier 000826457 347__ $$atext file$$bPDF$$2rda 000826457 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10744 000826457 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000826457 500__ $$aIncludes author index. 000826457 5050_ $$aGraphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack -- Defense Trees -- A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring -- the WISER Approach. 000826457 506__ $$aAccess limited to authorized users. 000826457 520__ $$aThis book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017. The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. 000826457 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 27, 2018). 000826457 650_0 $$aComputer security$$xGraphic methods$$vCongresses. 000826457 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000826457 7001_ $$aLiu, Peng,$$eeditor. 000826457 7001_ $$aMauw, S.,$$eeditor. 000826457 7001_ $$aStølen, Ketil,$$eeditor. 000826457 77608 $$iPrint version: $$z9783319748597 000826457 830_0 $$aLecture notes in computer science ;$$v10744. 000826457 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000826457 852__ $$bebk 000826457 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-74860-3$$zOnline Access$$91397441.1 000826457 909CO $$ooai:library.usi.edu:826457$$pGLOBAL_SET 000826457 980__ $$aEBOOK 000826457 980__ $$aBIB 000826457 982__ $$aEbook 000826457 983__ $$aOnline 000826457 994__ $$a92$$bISE