000 | 03893nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-62433-0 | ||
003 | DE-He213 | ||
005 | 20240730165636.0 | ||
007 | cr nn 008mamaa | ||
008 | 201106s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030624330 _9978-3-030-62433-0 |
||
024 | 7 |
_a10.1007/978-3-030-62433-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aModel-driven Simulation and Training Environments for Cybersecurity _h[electronic resource] : _bSecond International Workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers / _cedited by George Hatzivasilis, Sotiris Ioannidis. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aVIII, 179 p. 14 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v12512 |
|
505 | 0 | _aCyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?. | |
520 | _aThis book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aComputer crimes. _910774 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aDatabase Management System. _932540 |
650 | 2 | 4 |
_aComputer Crime. _986411 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _989979 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
700 | 1 |
_aHatzivasilis, George. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989980 |
|
700 | 1 |
_aIoannidis, Sotiris. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989981 |
|
710 | 2 |
_aSpringerLink (Online service) _989982 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030624323 |
776 | 0 | 8 |
_iPrinted edition: _z9783030624347 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v12512 _989983 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-62433-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86447 _d86447 |