語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Model-driven Simulation and Training...
~
SpringerLink (Online service)
Model-driven Simulation and Training Environments for Cybersecurity = Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Model-driven Simulation and Training Environments for Cybersecurity/ edited by George Hatzivasilis, Sotiris Ioannidis.
其他題名:
Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
其他作者:
Ioannidis, Sotiris.
面頁冊數:
VIII, 179 p. 14 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Legal Aspects of Computing. -
電子資源:
https://doi.org/10.1007/978-3-030-62433-0
ISBN:
9783030624330
Model-driven Simulation and Training Environments for Cybersecurity = Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
Model-driven Simulation and Training Environments for Cybersecurity
Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /[electronic resource] :edited by George Hatzivasilis, Sotiris Ioannidis. - 1st ed. 2020. - VIII, 179 p. 14 illus.online resource. - Security and Cryptology ;12512. - Security and Cryptology ;9241.
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games – Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern–driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?.
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
ISBN: 9783030624330
Standard No.: 10.1007/978-3-030-62433-0doiSubjects--Topical Terms:
669901
Legal Aspects of Computing.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Model-driven Simulation and Training Environments for Cybersecurity = Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
LDR
:02906nam a22004215i 4500
001
1019656
003
DE-He213
005
20201106195718.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030624330
$9
978-3-030-62433-0
024
7
$a
10.1007/978-3-030-62433-0
$2
doi
035
$a
978-3-030-62433-0
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Model-driven Simulation and Training Environments for Cybersecurity
$h
[electronic resource] :
$b
Second International Workshop, MSTEC 2020, Guildford, UK, September 14–18, 2020, Revised Selected Papers /
$c
edited by George Hatzivasilis, Sotiris Ioannidis.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
VIII, 179 p. 14 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
12512
505
0
$a
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games – Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern–driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?.
520
$a
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
650
2 4
$a
Legal Aspects of Computing.
$3
669901
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Computer Crime.
$3
1226852
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Law and legislation.
$3
1069250
650
0
$a
Computer organization.
$3
596298
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Computers.
$3
565115
650
0
$a
Computer security.
$3
557122
700
1
$a
Ioannidis, Sotiris.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1268025
700
1
$a
Hatzivasilis, George.
$e
editor.
$1
https://orcid.org/0000-0002-2213-7759
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1314968
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030624323
776
0 8
$i
Printed edition:
$z
9783030624347
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-62433-0
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入