Solution-aware data flow diagrams for security threat modelling
dc.contributor.author | Sion, Laurens | |
dc.contributor.author | Yskout, Koen | |
dc.contributor.author | Van landuyt, Dimitri | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2021-10-26T04:02:26Z | |
dc.date.available | 2021-10-26T04:02:26Z | |
dc.date.issued | 2018 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/31796 | |
dc.source | IIOimport | |
dc.title | Solution-aware data flow diagrams for security threat modelling | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Joosen, Wouter | |
dc.date.embargo | 9999-12-31 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 1425 | |
dc.source.endpage | 1432 | |
dc.source.conference | SAC '18 Proceedings of the 33rd Annual ACM Symposium on Applied Computing | |
dc.source.conferencedate | 9/04/2018 | |
dc.source.conferencelocation | Pau France | |
dc.identifier.url | https://doi.org/10.1145/3167132.3167285 | |
imec.availability | Published - open access |