Graphical Models for Security 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers /

Graphical Models for Security 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers / [electronic resource] : edited by Harley Eades III, Olga Gadyatskaya. - 1st ed. 2020. - XII, 199 p. 187 illus., 56 illus. in color. online resource. - Security and Cryptology, 12419 2946-1863 ; . - Security and Cryptology, 12419 .

Causal Model Extraction from Attack Trees to Attribute Malicious Insider Attacks -- Library-based Attack Tree Synthesis -- Asset-Centric Analysis and Visualisation of Attack Trees -- An attack simulation language for the IT domain -- Representing decision-makers in SGAM-H: The Smart Grid Architecture Model Extended with the Human Layer -- Breaking the cyber kill chain by modelling resource costs -- GroDDViewer: Dynamic Dual View of Android Malware -- Attack-Defence Frameworks: Argumentation-based Semantics for Attack-Defence Trees -- A diagrammatic approach to information flow in encrypted communication -- Contextualisation of Data Flow Diagrams for security analysis.

This book constitutes the proceedings of the 7th International Workshop on Graphical Models for Security, GramSec 2020, which took place on June 22, 2020. The workshop was planned to take place in Boston, MA, USA but changed to a virtual format due to the COVID-19 pandemic. The 7 full and 3 short papers presented in this volume were carefully reviewed and selected from 14 submissions. The papers were organized in topical sections named: attack trees; attacks and risks modelling and visualization; and models for reasoning about security. .

9783030622305

10.1007/978-3-030-62230-5 doi


Data protection.
Computers--Law and legislation.
Information technology--Law and legislation.
Cryptography.
Data encryption (Computer science).
Computer crimes.
Application software.
Data and Information Security.
Legal Aspects of Computing.
Cryptology.
Computer Crime.
Computer and Information Systems Applications.

QA76.9.A25

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in