LEADER 04268nam 22007695 450 001 996465299603316 005 20200702154855.0 010 $a3-319-74860-2 024 7 $a10.1007/978-3-319-74860-3 035 $a(CKB)4100000002485473 035 $a(DE-He213)978-3-319-74860-3 035 $a(MiAaPQ)EBC6285481 035 $a(MiAaPQ)EBC5592004 035 $a(Au-PeEL)EBL5592004 035 $a(OCoLC)1025327858 035 $a(PPN)22463772X 035 $a(EXLCZ)994100000002485473 100 $a20180220d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGraphical Models for Security$b[electronic resource] $e4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers /$fedited by Peng Liu, Sjouke Mauw, Ketil Stolen 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XI, 147 p. 48 illus.) 225 1 $aSecurity and Cryptology ;$v10744 311 $a3-319-74859-9 327 $aGraphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. 330 $aThis book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017.  The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security. 410 0$aSecurity and Cryptology ;$v10744 606 $aComputer security 606 $aComputer programming 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aComputers 606 $aComputer organization 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 615 0$aComputer security. 615 0$aComputer programming. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aComputers. 615 0$aComputer organization. 615 14$aSystems and Data Security. 615 24$aProgramming Techniques. 615 24$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aComputing Milieux. 615 24$aComputer Systems Organization and Communication Networks. 676 $a005.8 702 $aLiu$b Peng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMauw$b Sjouke$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aStolen$b Ketil$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465299603316 996 $aGraphical Models for Security$92278484 997 $aUNISA