Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Model-driven simulation and training...
~
(1998 :)
Model-driven simulation and training environments for cybersecuritysecond international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Model-driven simulation and training environments for cybersecurityedited by George Hatzivasilis, Sotiris Ioannidis.
Reminder of title:
second international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
remainder title:
MSTEC 2020
other author:
Hatzivasilis, George.
corporate name:
Published:
Cham :Springer International Publishing :2020.
Description:
viii, 179 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Computer securityCongresses.Study and teaching
Online resource:
https://doi.org/10.1007/978-3-030-62433-0
ISBN:
9783030624330$q(electronic bk.)
Model-driven simulation and training environments for cybersecuritysecond international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
Model-driven simulation and training environments for cybersecurity
second international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /[electronic resource] :MSTEC 2020edited by George Hatzivasilis, Sotiris Ioannidis. - Cham :Springer International Publishing :2020. - viii, 179 p. :ill., digital ;24 cm. - Lecture notes in computer science,125120302-9743 ;. - Lecture notes in computer science ;4891..
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
ISBN: 9783030624330$q(electronic bk.)
Standard No.: 10.1007/978-3-030-62433-0doiSubjects--Topical Terms:
881236
Computer security
--Study and teaching--Congresses.
LC Class. No.: QA76.9.A25 / M77 2020
Dewey Class. No.: 005.8
Model-driven simulation and training environments for cybersecuritysecond international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
LDR
:02662nmm a2200373 a 4500
001
589385
003
DE-He213
005
20201106195718.0
006
m d
007
cr nn 008maaau
008
210601s2020 sz s 0 eng d
020
$a
9783030624330$q(electronic bk.)
020
$a
9783030624323$q(paper)
024
7
$a
10.1007/978-3-030-62433-0
$2
doi
035
$a
978-3-030-62433-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
M77 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
M939 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Model-driven simulation and training environments for cybersecurity
$h
[electronic resource] :
$b
second international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
$c
edited by George Hatzivasilis, Sotiris Ioannidis.
246
3
$a
MSTEC 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
viii, 179 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12512
490
1
$a
Security and cryptology
505
0
$a
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?
520
$a
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
650
0
$a
Computer security
$x
Study and teaching
$x
Simulation methods
$v
Congresses.
$3
881236
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
0
$a
Application software
$v
Congresses.
$3
444088
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Computer Crime.
$3
833604
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Legal Aspects of Computing.
$3
276398
700
1
$a
Hatzivasilis, George.
$3
881235
700
1
$a
Ioannidis, Sotiris.
$3
682961
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-62433-0
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000191820
電子館藏
1圖書
電子書
EB QA76.9.A25 M939 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-62433-0
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login