語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Model-driven simulation and training...
~
(1998 :)
Model-driven simulation and training environments for cybersecuritysecond international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Model-driven simulation and training environments for cybersecurityedited by George Hatzivasilis, Sotiris Ioannidis.
其他題名:
second international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
其他題名:
MSTEC 2020
其他作者:
Hatzivasilis, George.
團體作者:
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
viii, 179 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer securityCongresses.Study and teaching
電子資源:
https://doi.org/10.1007/978-3-030-62433-0
ISBN:
9783030624330$q(electronic bk.)
Model-driven simulation and training environments for cybersecuritysecond international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
Model-driven simulation and training environments for cybersecurity
second international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /[electronic resource] :MSTEC 2020edited by George Hatzivasilis, Sotiris Ioannidis. - Cham :Springer International Publishing :2020. - viii, 179 p. :ill., digital ;24 cm. - Lecture notes in computer science,125120302-9743 ;. - Lecture notes in computer science ;4891..
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
ISBN: 9783030624330$q(electronic bk.)
Standard No.: 10.1007/978-3-030-62433-0doiSubjects--Topical Terms:
881236
Computer security
--Study and teaching--Congresses.
LC Class. No.: QA76.9.A25 / M77 2020
Dewey Class. No.: 005.8
Model-driven simulation and training environments for cybersecuritysecond international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
LDR
:02662nmm a2200373 a 4500
001
589385
003
DE-He213
005
20201106195718.0
006
m d
007
cr nn 008maaau
008
210601s2020 sz s 0 eng d
020
$a
9783030624330$q(electronic bk.)
020
$a
9783030624323$q(paper)
024
7
$a
10.1007/978-3-030-62433-0
$2
doi
035
$a
978-3-030-62433-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
M77 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
M939 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Model-driven simulation and training environments for cybersecurity
$h
[electronic resource] :
$b
second international workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020 : revised selected papers /
$c
edited by George Hatzivasilis, Sotiris Ioannidis.
246
3
$a
MSTEC 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
viii, 179 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12512
490
1
$a
Security and cryptology
505
0
$a
Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems -- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models -- A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education -- Conceptualization of a CyberSecurity Awareness Quiz -- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges -- Automatically protecting network communities by malware epidemiology -- Chasing Botnets: A Real Security Incident Investigation -- Software System Exploration using Library Call Analysis -- A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties -- Password Management: How Secure Is Your Login Process?
520
$a
This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020. The conference was held virtually due to the COVID-19 pandemic. The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on: cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.
650
0
$a
Computer security
$x
Study and teaching
$x
Simulation methods
$v
Congresses.
$3
881236
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
0
$a
Application software
$v
Congresses.
$3
444088
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Computer Crime.
$3
833604
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
273709
650
2 4
$a
Legal Aspects of Computing.
$3
276398
700
1
$a
Hatzivasilis, George.
$3
881235
700
1
$a
Ioannidis, Sotiris.
$3
682961
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Security and cryptology.
$3
822028
856
4 0
$u
https://doi.org/10.1007/978-3-030-62433-0
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000191820
電子館藏
1圖書
電子書
EB QA76.9.A25 M939 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-62433-0
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入