Publication:
Security threat modeling: Are data flow diagrams enough?
Date
| dc.contributor.author | Sion, Laurens | |
| dc.contributor.author | Yskout, Koen | |
| dc.contributor.author | Van landuyt, Dimitri | |
| dc.contributor.author | Van den Berghe, Alexander | |
| dc.contributor.author | Joosen, Wouter | |
| dc.contributor.imecauthor | Joosen, Wouter | |
| dc.date.accessioned | 2021-10-29T04:19:03Z | |
| dc.date.available | 2021-10-29T04:19:03Z | |
| dc.date.embargo | 9999-12-31 | |
| dc.date.issued | 2020 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/35964 | |
| dc.identifier.url | https://doi.org/10.1145/3387940.3392221 | |
| dc.source.beginpage | 254 | |
| dc.source.conference | 1st International Workshop on Engineering and Cybersecurity of Critical Systems - EnCyCriS | |
| dc.source.conferencedate | 23/05/2020 | |
| dc.source.conferencelocation | Seoul South-korea | |
| dc.source.endpage | 257 | |
| dc.title | Security threat modeling: Are data flow diagrams enough? | |
| dc.type | Proceedings paper | |
| dspace.entity.type | Publication | |
| Files | Original bundle
| |
| Publication available in collections: |