You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings from the Third International Workshop on Graphical Models for Security, GraMSec 2016, held in Lisbon, Portugal, in June 2016. The 9 papers presented in this volume were carefully reviewed and selected from 23 submissions. The volume also contains the invited talk by Xinming Ou. GraMSec contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage.
This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015.The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures. /div
This book constitutes revised papers from the 6th International Workshop on Graphical Models for Security, GraMSec 2019, held in Hoboken, NJ, USA, in June 2019. The 8 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains two invited talk. The contributions deal with the latest research and developments on graphical models for security.
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
This book constitutes the refereed proceedings of the workshops which complemented the 12th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2014, held in Salamanca, Spain, in June 2014. This volume presents the papers that have been accepted for the following workshops: Workshop on Agent-based Approaches for the Transportation Modeling and Optimization (AATMO 2014); Workshop on Agent-based Modeling and Simulation of Complex Systems: Engineering and Applications (ABSEA 2014); Workshop on Agents and Multi-Agent Systems for Ambient-assisted Living and e-Health (A-HEALTH 2014); Workshop on Agent-based Solutions for Manufacturing and Supply Chain (AMSC 2014); Workshop on Intelligent Systems for Context-based Information Fusion (ISCIF 2014); Workshop on Multi-Agent based Applications for Smart Grids and Sustainable Energy Systems (MASGES 2014); Workshop on Active Security Through Multi-Agent Systems (WASMAS 2014); Workshop on Intelligent Human-Agent Societies (WIHAS 2014).
ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of this conference was to provide a forum for the presentation of new results in research, development, and applications in the ?eld of information security and cryptology. It also served as a place for research information exchange. The conference received 88 submissions from 22 countries, covering all areas of inf- mation security and cryptology. The review and selection processes were carried o...
This book constitutes the revised selected papers from the 12th International Conference on Risk and Security of Internet and Systems, CRISIS 2017, held in Dinard, France, in September 2017.The 12 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 42 submissions. They cover diverse research themes, ranging from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
This book constitutes the refereed proceedings of the First International Conference on Decision and Game Theory for Security, GameSec 2010, held in Berlin, Germany, in November 2010. The 12 revised full papers and 6 revised short papers presented were carefully reviewed and selected from numerous submissions and focus on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. The papers are organized in topical sections on security investments and planning, privacy and anonymity, adversarial and robust control, network security and botnets, authorization and authentication, as well as theory and algorithms for security.
This book constitutes the refereed proceedings of the 13th International Conference on Integrated Formal Methods, IFM 2017, held in Turin, Italy, in September 2017. The 24 full papers and 4 short papers presented were carefully reviewed and selected from 61 submissions. They are organized in topical sections on cyber-physical systems, software verification tools, safety-critical systems, concurrency and distributed systems, program verification techniques, formal modeling, and verified software..
This volume contains the papers presented at the 7th International Symposium on Automated Technologyfor Veri?cation and Analysis held during October 13- 16 in Macao SAR, China. The primary objective of the ATVA conferences - mains the same: to exchangeand promote the latest advances of state-of-the-art researchon theoretical and practical aspects of automated analysis, veri?cation, and synthesis. Among 74 research papers and 10 tool papers submitted to ATVA 2009, the Program Committee accepted 23 as regular papers and 3 as tool papers. In all, 33 experts from 17 countries worked hard to make sure that every submission received a rigorous and fair evaluation. In addition, the program included...