Pub Date : 2020-02-15DOI: 10.1007/978-3-030-41103-9_10
Sebastian Hunt, David Sands
{"title":"New Program Abstractions for Privacy","authors":"Sebastian Hunt, David Sands","doi":"10.1007/978-3-030-41103-9_10","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_10","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132997056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-11DOI: 10.1007/978-3-030-41103-9_11
S. Panda, E. Panaousis, G. Loukas, C. Laoudias
{"title":"Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users","authors":"S. Panda, E. Panaousis, G. Loukas, C. Laoudias","doi":"10.1007/978-3-030-41103-9_11","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_11","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-41103-9_1
S. Gay
{"title":"Cables, Trains and Types","authors":"S. Gay","doi":"10.1007/978-3-030-41103-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_1","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122110541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-41103-9_2
R. Evans, Martin Berger
{"title":"Cathoristic Logic","authors":"R. Evans, Martin Berger","doi":"10.1007/978-3-030-41103-9_2","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_2","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-41103-9_6
Torben Amtoft, K. Androutsopoulos, D. Clark
{"title":"Correctly Slicing Extended Finite State Machines","authors":"Torben Amtoft, K. Androutsopoulos, D. Clark","doi":"10.1007/978-3-030-41103-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_6","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126206991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-41103-9_8
Andrew Fielder
{"title":"Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games","authors":"Andrew Fielder","doi":"10.1007/978-3-030-41103-9_8","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_8","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-41103-9_9
C. Bodei, P. Degano, G. Ferrari, Letterio Galletta
{"title":"Security Metrics at Work on the Things in IoT Systems","authors":"C. Bodei, P. Degano, G. Ferrari, Letterio Galletta","doi":"10.1007/978-3-030-41103-9_9","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_9","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117071014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-41103-9_4
Ahmad Salim Al-Sibahi, T. Jensen, Rasmus Ejlers Møgelberg, A. Wąsowski
{"title":"Galois Connections for Recursive Types","authors":"Ahmad Salim Al-Sibahi, T. Jensen, Rasmus Ejlers Møgelberg, A. Wąsowski","doi":"10.1007/978-3-030-41103-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9_4","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"938 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133648246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-030-41103-9
{"title":"From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement","authors":"","doi":"10.1007/978-3-030-41103-9","DOIUrl":"https://doi.org/10.1007/978-3-030-41103-9","url":null,"abstract":"","PeriodicalId":305659,"journal":{"name":"From Lambda Calculus to Cybersecurity Through Program Analysis","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}