menu
{ "item_title" : "Graphical Models for Security", "item_author" : [" George Cybenko", "David Pym", "Barbara Fila "], "item_description" : "Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins.- Deciding the Non-Emptiness of Attack trees.- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures.- Disclosure Analysis of SQL Workflows.- On Linear Logic, Functional Programming, and Attack Trees.- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement.- A State Machine System for Insider Threat Detection.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/3/03/015/464/3030154645_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Graphical Models for Security|George Cybenko

Graphical Models for Security : 5th International Workshop, Gramsec 2018, Oxford, Uk, July 8, 2018, Revised Selected Papers

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins.- Deciding the Non-Emptiness of Attack trees.- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures.- Disclosure Analysis of SQL Workflows.- On Linear Logic, Functional Programming, and Attack Trees.- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement.- A State Machine System for Insider Threat Detection.

This item is Non-Returnable

Details

  • ISBN-13: 9783030154646
  • ISBN-10: 3030154645
  • Publisher: Springer
  • Publish Date: March 2019
  • Dimensions: 9.21 x 6.14 x 0.31 inches
  • Shipping Weight: 0.47 pounds
  • Page Count: 131

Related Categories

You May Also Like...

    1

BAM Customer Reviews