000946136 000__ 02782cam\a2200577M\\4500 000946136 001__ 946136 000946136 005__ 20230306152533.0 000946136 006__ m\\\\\o\\d\\\\\\\\ 000946136 007__ cr\un\nnnunnun 000946136 008__ 201110s2020\\\\sz\a\\\\o\\\\\101\0\eng\d 000946136 019__ $$a1204310399$$a1206396093$$a1225933162$$a1233064789 000946136 020__ $$a9783030622305$$q(electronic book) 000946136 020__ $$a3030622304$$q(electronic book) 000946136 020__ $$z3030622290 000946136 020__ $$z9783030622299 000946136 0247_ $$a10.1007/978-3-030-62230-5$$2doi 000946136 035__ $$aSP(OCoLC)on1225563131 000946136 035__ $$aSP(OCoLC)1225563131 000946136 040__ $$aSFB$$beng$$erda$$cSFB$$dOCLCO$$dYDXIT$$dOCLCF$$dGW5XE$$dYDX$$dUKBTH$$dUPM$$dUKMGB$$dEBLCP$$dOCLCO 000946136 049__ $$aISEA 000946136 050_4 $$aQA76.9.A25$$bG73 2020 000946136 08204 $$a005.8$$223 000946136 1112_ $$aGraMSec (Workshop)$$n(7th :$$d2020 :$$cOnline) 000946136 24510 $$aGraphical models for security :$$b7th international workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, revised selected papers /$$cHarley Eades III, Olga Gadyatskaya (eds.). 000946136 2463_ $$aGraMSec 2020 000946136 264_1 $$aCham :$$bSpringer,$$c[2020] 000946136 300__ $$a1 online resource (xii, 199 pages) :$$billustrations 000946136 336__ $$atext$$btxt$$2rdacontent 000946136 337__ $$acomputer$$bc$$2rdamedia 000946136 338__ $$aonline resource$$bcr$$2rdacarrier 000946136 4901_ $$aLecture notes in computer science ;$$v12419 000946136 4901_ $$aLNCS sublibrary: SL4 -- Security and cryptology 000946136 500__ $$aIncludes author index. 000946136 504__ $$aIncludes bibliographical references and index. 000946136 5050_ $$aCausal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks -- Library-based Attack Tree Synthesis -- Asset-Centric Analysis and Visualisation of Attack Trees -- An attack simulation language for the IT domain -- Representing decision-makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer -- Breaking the cyber kill chain by modelling resource costs -- GroDDViewer: Dynamic Dual View of Android Malware -- Attack-Defence Frameworks: Argumentation-based Semantics for Attack-Defence Trees -- A diagrammatic approach to information flow in encrypted communication -- Contextualisation of Data Flow Diagrams for security analysis. 000946136 506__ $$aAccess limited to authorized users. 000946136 5880_ $$aOnline resource; title from PDF title page (SpringerLink, viewed January 27, 2021). 000946136 650_0 $$aComputer security$$xGraphic methods$$vCongresses. 000946136 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000946136 650_0 $$aData encryption (Computer science)$$vCongresses. 000946136 650_0 $$aComputer security. 000946136 650_0 $$aComputers$$xLaw and legislation. 000946136 7001_ $$aEades, Harley,$$cIII$$eeditor. 000946136 7001_ $$aGadyatskaya, Olga,$$eeditor. 000946136 77608 $$iPrint version:$$z3030622290$$z9783030622299$$w(OCoLC)1197849575 000946136 830_0 $$aLecture notes in computer science ;$$v12419. 000946136 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000946136 852__ $$bebk 000946136 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-62230-5$$zOnline Access$$91397441.1 000946136 909CO $$ooai:library.usi.edu:946136$$pGLOBAL_SET 000946136 980__ $$aEBOOK 000946136 980__ $$aBIB 000946136 982__ $$aEbook 000946136 983__ $$aOnline 000946136 994__ $$a92$$bISE