Multilevel modeling of secure systems in QoP-ML
This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Topics include: quality of protec...
Saved in:
| Main Author: | Ksįeżopolski, Bogdan (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press, Taylor & Francis
2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Computer simulation
by: WatsonlhHugh J.
by: WatsonlhHugh J.
Computer Simulation
by: WatsonlhHugh J.
by: WatsonlhHugh J.
Simulation Modeling using @ Risk
by: Winston lhWayne L.
by: Winston lhWayne L.
Hands-On Simulation Modeling with Python : Develop simulation models for improved efficiency and precision in the decision-making process /
by: Ciaburro, Giuseppe
Published: (2022)
by: Ciaburro, Giuseppe
Published: (2022)
Advanced computational electromagnetic methods and applications
Published: (2015)
Published: (2015)
Real-time simulation technologies principles, methodologies, and applications
Published: (2013)
Published: (2013)
An introduction to computer simulation methods
by: Gould
Published: (1996)
by: Gould
Published: (1996)
Information security--the next decade : proceedings of the IFIP TC11 Eleventh International Conference on Information Security, IFIP/Sec '95
Published: (1995)
Published: (1995)
Innovative solutions for access control management
Published: (2016)
Published: (2016)
Digital identity management
Published: (2015)
Published: (2015)
Simulation and modeling current technologies and applications
Published: (2008)
Published: (2008)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
Simulation model design and execution building digital works
by: Fishwick
Published: (1995)
by: Fishwick
Published: (1995)
Security in distributed computing Did you lock the Door?
by: Bruce
Published: (1997)
by: Bruce
Published: (1997)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Simulation of manufacturing systems
by: Carrie
Published: (1988)
by: Carrie
Published: (1988)
Contemporary communication company using matlob
by: Proakis lhJohn
by: Proakis lhJohn
Modern communication systems using MATLAB
by: Proakis, John G., et al.
Published: (2013)
by: Proakis, John G., et al.
Published: (2013)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Big data analytics with applications in insider threat detection
by: Thuraisingham, Bhavani, et al.
Published: (2018)
by: Thuraisingham, Bhavani, et al.
Published: (2018)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
Cyber security of industrial control systems in the future internet environment
Published: (2020)
Published: (2020)
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Theory of Modeling and Simulation : Discrete Event & Iterative System Computational Foundations /
by: Zeigler, Bernard P., et al.
Published: (2019)
by: Zeigler, Bernard P., et al.
Published: (2019)
Simulation the practice of model development and use
by: Robinson, Stewart 1964
Published: (2014)
by: Robinson, Stewart 1964
Published: (2014)
Kali Linux cookbook effective penetration testing solutions
by: Schultz, Corey P., et al.
Published: (2017)
by: Schultz, Corey P., et al.
Published: (2017)
Communication Systems Principles Using MATLAB
by: Leis, John
Published: (2018)
by: Leis, John
Published: (2018)
Contemporary communication systems using MATLAB
by: ProakislhJohn G.
by: ProakislhJohn G.
Semiconductor device modeling with SPICE
by: lh
Published: (1993)
by: lh
Published: (1993)
Introduction to MATLAB & SIMULINK a project approach
by: Beucher, O
Published: (2007)
by: Beucher, O
Published: (2007)
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
Similar Items
-
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010) -
ENHANCING CENTRALISED CYBERSECURITY FOR CAMPUS NETWORK INFRASTRUCTURE USING LOG CONSOLIDATION PROCESSING FRAMEWORK BASED ON SIEM /
by: Mohd Azmi Mustafa @ Sulaiman
Published: (2021) -
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989) -
Computer simulation
by: WatsonlhHugh J. -
Computer Simulation
by: WatsonlhHugh J.


