Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_17
A. Tokhtabayev, A. Kopeikin, N. Tashatov, D. Satybaldina
{"title":"Malware Analysis and Detection via Activity Trees in User-Dependent Environment","authors":"A. Tokhtabayev, A. Kopeikin, N. Tashatov, D. Satybaldina","doi":"10.1007/978-3-319-65127-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_17","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_4
Laurens Lemaire, Jan Vossaert, B. Decker, Vincent Naessens
{"title":"Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems","authors":"Laurens Lemaire, Jan Vossaert, B. Decker, Vincent Naessens","doi":"10.1007/978-3-319-65127-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_4","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125109825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_15
M. Davis, E. Korkmaz, A. Dolgikh, V. Skormin
{"title":"Resident Security System for Government/Industry Owned Computers","authors":"M. Davis, E. Korkmaz, A. Dolgikh, V. Skormin","doi":"10.1007/978-3-319-65127-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_15","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116452318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-28DOI: 10.1007/978-3-319-65127-9_13
A. Sitek, Z. Kotulski
{"title":"Cardholder's Reputation System for Contextual Risk Management in Payment Transactions","authors":"A. Sitek, Z. Kotulski","doi":"10.1007/978-3-319-65127-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-65127-9_13","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_9
Vladimir A. Oleshchuk
{"title":"Trust-Aware RBAC","authors":"Vladimir A. Oleshchuk","doi":"10.1007/978-3-642-33704-8_9","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_9","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_16
J. Schütte, R. Rieke, Timo Winkelvos
{"title":"Model-Based Security Event Management","authors":"J. Schütte, R. Rieke, Timo Winkelvos","doi":"10.1007/978-3-642-33704-8_16","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_16","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122504399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_25
P. D. Zegzhda, D. Zegzhda, M. Kalinin, A. S. Konoplev
{"title":"Security Modeling of Grid Systems Using Petri Nets","authors":"P. D. Zegzhda, D. Zegzhda, M. Kalinin, A. S. Konoplev","doi":"10.1007/978-3-642-33704-8_25","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_25","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114359532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_26
P. D. Zegzhda, D. Zegzhda, A. Nikolskiy
{"title":"Using Graph Theory for Cloud System Security Modeling","authors":"P. D. Zegzhda, D. Zegzhda, A. Nikolskiy","doi":"10.1007/978-3-642-33704-8_26","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_26","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}