Publication:

Security threat modeling: Are data flow diagrams enough?

Date

 
dc.contributor.authorSion, Laurens
dc.contributor.authorYskout, Koen
dc.contributor.authorVan landuyt, Dimitri
dc.contributor.authorVan den Berghe, Alexander
dc.contributor.authorJoosen, Wouter
dc.contributor.imecauthorJoosen, Wouter
dc.date.accessioned2021-10-29T04:19:03Z
dc.date.available2021-10-29T04:19:03Z
dc.date.embargo9999-12-31
dc.date.issued2020
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/35964
dc.identifier.urlhttps://doi.org/10.1145/3387940.3392221
dc.source.beginpage254
dc.source.conference1st International Workshop on Engineering and Cybersecurity of Critical Systems - EnCyCriS
dc.source.conferencedate23/05/2020
dc.source.conferencelocationSeoul South-korea
dc.source.endpage257
dc.title

Security threat modeling: Are data flow diagrams enough?

dc.typeProceedings paper
dspace.entity.typePublication
Files

Original bundle

Name:
46818.pdf
Size:
95.58 KB
Format:
Adobe Portable Document Format
Publication available in collections: