Publication:

Threat Modeling: A Rough Diamond or Fool's Gold?

 
dc.contributor.authorAnh-Duy Tran
dc.contributor.authorYskout, Koen
dc.contributor.authorJoosen, Wouter
dc.contributor.imecauthorAnh-Duy Tran
dc.contributor.imecauthorYskout, Koen
dc.contributor.imecauthorJoosen, Wouter
dc.date.accessioned2025-06-17T12:12:11Z
dc.date.available2024-10-10T19:45:30Z
dc.date.available2025-06-17T12:12:11Z
dc.date.issued2024
dc.description.wosFundingTextThis research is partially funded by the Research Fund KU Leuven, and by the Flemish Research Programme Cybersecurity.
dc.identifier.doi10.1007/978-3-031-66326-0_8
dc.identifier.eisbn978-3-031-66326-0
dc.identifier.isbn978-3-031-66325-3
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/44620
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage120
dc.source.conference17th European Conference on Software Architecture (ECSA)
dc.source.conferencedateSEP 18-22, 2023
dc.source.conferencelocationIstanbul
dc.source.endpage129
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages10
dc.source.volume14590
dc.title

Threat Modeling: A Rough Diamond or Fool's Gold?

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: