Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers / [electronic resource] : edited by George Cybenko, David Pym, Barbara Fila. - 1st ed. 2019. - XI, 131 p. 56 illus. online resource. - Security and Cryptology, 11086 2946-1863 ; . - Security and Cryptology, 11086 .

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins -- Deciding the Non-Emptiness of Attack trees -- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures -- Disclosure Analysis of SQL Workflows -- On Linear Logic, Functional Programming, and Attack Trees -- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement -- A State Machine System for Insider Threat Detection. .

This book constitutes revised selected papers from the 5th International Workshop on Graphical Models for Security, GraMSec 2018, held in Oxford, UK, in July 2018. The 7 full papers presented in this volume were carefully reviewed and selected from 21 submissions. The book also contains one invited talk. The contributions deal with the latest research and developments on graphical models for security.

9783030154653

10.1007/978-3-030-15465-3 doi


Data protection.
Artificial intelligence.
Computer crimes.
Computer programming.
Compilers (Computer programs).
Computers--Law and legislation.
Information technology--Law and legislation.
Data and Information Security.
Artificial Intelligence.
Computer Crime.
Programming Techniques.
Compilers and Interpreters.
Legal Aspects of Computing.

QA76.9.A25

005.8