Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Model-driven Simulation and Training...
~
Hatzivasilis, George.
Model-driven Simulation and Training Environments for Cybersecurity = Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Model-driven Simulation and Training Environments for Cybersecurity/ edited by George Hatzivasilis, Sotiris Ioannidis.
Reminder of title:
Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
other author:
Hatzivasilis, George.
Description:
VIII, 179 p. 14 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-3-030-62433-0
ISBN:
9783030624330
Model-driven Simulation and Training Environments for Cybersecurity = Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
Model-driven Simulation and Training Environments for Cybersecurity
Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /[electronic resource] :edited by George Hatzivasilis, Sotiris Ioannidis. - 1st ed. 2020. - VIII, 179 p. 14 illus.online resource. - Security and Cryptology ;12512. - Security and Cryptology ;9241.
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games – Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern–driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
ISBN: 9783030624330
Standard No.: 10.1007/978-3-030-62433-0doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Model-driven Simulation and Training Environments for Cybersecurity = Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
LDR
:02906nam a22004215i 4500
001
1019656
003
DE-He213
005
20201106195718.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030624330
$9
978-3-030-62433-0
024
7
$a
10.1007/978-3-030-62433-0
$2
doi
035
$a
978-3-030-62433-0
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Model-driven Simulation and Training Environments for Cybersecurity
$h
[electronic resource] :
$b
Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
$c
edited by George Hatzivasilis, Sotiris Ioannidis.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
VIII, 179 p. 14 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12512
505
0
$a
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games – Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern–driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?.
520
$a
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
650
0
$a
Computer security.
$3
557122
650
0
$a
Computers.
$3
565115
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Computer organization.
$3
596298
650
0
$a
Law and legislation.
$3
1069250
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computer Crime.
$3
1226852
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Legal Aspects of Computing.
$3
669901
700
1
$a
Hatzivasilis, George.
$e
editor.
$1
https://orcid.org/0000-0002-2213-7759
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1314968
700
1
$a
Ioannidis, Sotiris.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1268025
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030624323
776
0 8
$i
Printed edition:
$z
9783030624347
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-62433-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login