Model-driven Simulation and Training Environments for Cybersecurity : Second International Workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Security and Cryptology)

個数:

Model-driven Simulation and Training Environments for Cybersecurity : Second International Workshop, MSTEC 2020, Guildford, UK, September 14-18, 2020, Revised Selected Papers (Security and Cryptology)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 179 p.
  • 言語 ENG
  • 商品コード 9783030624323

Full Description

This book constitutes the refereed post-conference proceedings of the Second International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity, MSTEC 2020, held in Guildford, UK, in September 2020 in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2020.
The conference was held virtually due to the COVID-19 pandemic.
The MSTEC Workshop received 20 submissions from which 10 full papers were selected for presentation. The papers are grouped in thematically on:
cyber security training modelling; serious games; emulation & simulation studies; attacks; security policies.

Contents

Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education Systems.- Cyber Range Training Programme Specification through Cyber Threat and Training Preparation Models .- A Pond Full of Phishing Games - Analysis of Learning Games for Anti-Phishing Education.- Conceptualization of a CyberSecurity Awareness Quiz.- Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges.- Automatically protecting network communities by malware epidemiology.- Chasing Botnets: A Real Security Incident Investigation.- Software System Exploration using Library Call Analysis.- A pattern-driven adaptation in IoT orchestrations to guarantee SPDI properties.- Password Management: How Secure Is Your Login Process?.

最近チェックした商品