Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: GraMSec Santa Barbara, Calif (VerfasserIn)
Weitere Verfasser: Liu, Peng 1970- (HerausgeberIn), Mauw, Sjouke (HerausgeberIn), Stolen, Ketil (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham Springer [2018]
Schriftenreihe:Lecture Notes in Computer Science 10744
Schlagworte:
Online-Zugang:BTU01
FHA01
FHI01
FHM01
FHN01
FHR01
FKE01
FLA01
FRO01
FWS01
FWS02
HTW01
TUM01
UBA01
UBG01
UBM01
UBR01
UBT01
UBW01
UBY01
UER01
UPA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV044828122
003 DE-604
005 20180314
006 a |||| 10|||
007 cr|uuu---uuuuu
008 180305s2018 |||| o||u| ||||||eng d
020 |a 9783319748603  |c Online  |9 978-3-319-74860-3 
024 7 |a 10.1007/978-3-319-74860-3  |2 doi 
035 |a (ZDB-2-SCS)9783319748603 
035 |a (ZDB-2-LNC)9783319748603 
035 |a (OCoLC)1027749929 
035 |a (DE-599)BVBBV044828122 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-20  |a DE-862  |a DE-92  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.8  |2 23 
084 |a SS 4800  |0 (DE-625)143528:  |2 rvk 
084 |a DAT 000  |2 stub 
111 2 |a GraMSec  |n 4.  |d 2017  |c Santa Barbara, Calif.  |j Verfasser  |0 (DE-588)1154497240  |4 aut 
245 1 0 |a Graphical models for security  |b 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers  |c Peng Liu, Sjouke Mauw, Ketil Stolen (Eds.) 
264 1 |a Cham  |b Springer  |c [2018] 
300 |a 1 Online-Ressource (VIII, 147 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 10744  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Computer organization 
650 4 |a Computer programming 
650 4 |a Software engineering 
650 4 |a Computer security 
650 4 |a Artificial intelligence 
650 4 |a Computers 
650 4 |a Computer Science 
650 4 |a Systems and Data Security 
650 4 |a Programming Techniques 
650 4 |a Software Engineering 
650 4 |a Artificial Intelligence (incl. Robotics) 
650 4 |a Computing Milieux 
650 4 |a Computer Systems Organization and Communication Networks 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |2 gnd-content 
700 1 |a Liu, Peng  |d 1970-  |0 (DE-588)1072570947  |4 edt 
700 1 |a Mauw, Sjouke  |4 edt 
700 1 |a Stolen, Ketil  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-319-74859-7 
830 0 |a Lecture Notes in Computer Science  |v 10744  |w (DE-604)BV014880109  |9 10744 
856 4 0 |u https://doi.org/10.1007/978-3-319-74860-3  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2018 
940 1 |q ZDB-2-LNC_2018 
999 |a oai:aleph.bib-bvb.de:BVB01-030222994 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l BTU01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FHA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FHI01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FHM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FHN01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FHR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FKE01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FLA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FRO01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FWS01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l FWS02  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l HTW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l TUM01  |p ZDB-2-LNC  |q ZDB-2-LNC_2018  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UBG01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UBR01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UBT01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UBW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UBY01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UER01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-319-74860-3  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 682249
DE-BY-TUM_katkey 2314795
DE-BY-TUM_local_url https://doi.org/10.1007/978-3-319-74860-3
Verlag
DE-BY-UBG_katkey 196442640
DE-BY-UBG_local_url Verlag
https://doi.org/10.1007/978-3-319-74860-3
_version_ 1816714411615715328
any_adam_object
author2 Liu, Peng 1970-
Mauw, Sjouke
Stolen, Ketil
author2_role edt
edt
edt
author2_variant p l pl
s m sm
k s ks
author_GND (DE-588)1072570947
author_corporate GraMSec Santa Barbara, Calif
author_corporate_role aut
author_facet Liu, Peng 1970-
Mauw, Sjouke
Stolen, Ketil
GraMSec Santa Barbara, Calif
author_sort GraMSec Santa Barbara, Calif
building Verbundindex
bvnumber BV044828122
classification_rvk SS 4800
classification_tum DAT 000
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783319748603
(ZDB-2-LNC)9783319748603
(OCoLC)1027749929
(DE-599)BVBBV044828122
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-319-74860-3
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04632nmm a2200901zcb4500</leader><controlfield tag="001">BV044828122</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180314 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180305s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319748603</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-74860-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-74860-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783319748603</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783319748603</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1027749929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044828122</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">GraMSec</subfield><subfield code="n">4.</subfield><subfield code="d">2017</subfield><subfield code="c">Santa Barbara, Calif.</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1154497240</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Graphical models for security</subfield><subfield code="b">4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers</subfield><subfield code="c">Peng Liu, Sjouke Mauw, Ketil Stolen (Eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (VIII, 147 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10744</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer organization</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computing Milieux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Systems Organization and Communication Networks</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liu, Peng</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)1072570947</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mauw, Sjouke</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stolen, Ketil</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-319-74859-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">10744</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">10744</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2018</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2018</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030222994</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2018</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-74860-3</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift gnd-content
genre_facet Konferenzschrift
id DE-604.BV044828122
illustrated Not Illustrated
index_date 2024-09-20T13:29:36Z
indexdate 2024-11-25T17:57:35Z
institution BVB
institution_GND (DE-588)1154497240
isbn 9783319748603
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030222994
oclc_num 1027749929
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-20
DE-862
DE-BY-FWS
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (VIII, 147 Seiten) Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2018
ZDB-2-LNC_2018
ZDB-2-LNC ZDB-2-LNC_2018
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers
Lecture Notes in Computer Science
Computer science
Computer organization
Computer programming
Software engineering
Computer security
Artificial intelligence
Computers
Computer Science
Systems and Data Security
Programming Techniques
Software Engineering
Artificial Intelligence (incl. Robotics)
Computing Milieux
Computer Systems Organization and Communication Networks
subject_GND (DE-588)1071861417
title Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers
title_auth Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers
title_exact_search Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers
title_full Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers Peng Liu, Sjouke Mauw, Ketil Stolen (Eds.)
title_fullStr Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers Peng Liu, Sjouke Mauw, Ketil Stolen (Eds.)
title_full_unstemmed Graphical models for security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers Peng Liu, Sjouke Mauw, Ketil Stolen (Eds.)
title_short Graphical models for security
title_sort graphical models for security 4th international workshop gramsec 2017 santa barbara ca usa august 21 2017 revised selected papers
title_sub 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017 : revised selected papers
topic Computer science
Computer organization
Computer programming
Software engineering
Computer security
Artificial intelligence
Computers
Computer Science
Systems and Data Security
Programming Techniques
Software Engineering
Artificial Intelligence (incl. Robotics)
Computing Milieux
Computer Systems Organization and Communication Networks
topic_facet Computer science
Computer organization
Computer programming
Software engineering
Computer security
Artificial intelligence
Computers
Computer Science
Systems and Data Security
Programming Techniques
Software Engineering
Artificial Intelligence (incl. Robotics)
Computing Milieux
Computer Systems Organization and Communication Networks
Konferenzschrift
url https://doi.org/10.1007/978-3-319-74860-3
volume_link (DE-604)BV014880109
work_keys_str_mv AT gramsecsantabarbaracalif graphicalmodelsforsecurity4thinternationalworkshopgramsec2017santabarbaracausaaugust212017revisedselectedpapers
AT liupeng graphicalmodelsforsecurity4thinternationalworkshopgramsec2017santabarbaracausaaugust212017revisedselectedpapers
AT mauwsjouke graphicalmodelsforsecurity4thinternationalworkshopgramsec2017santabarbaracausaaugust212017revisedselectedpapers
AT stolenketil graphicalmodelsforsecurity4thinternationalworkshopgramsec2017santabarbaracausaaugust212017revisedselectedpapers