Knowledge is power: systematic reuse of privacy knowledge for threat elicitation
dc.contributor.author | Wuyts, Kim | |
dc.contributor.author | Sion, Laurens | |
dc.contributor.author | Van Landuyt, Dimitri | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2021-10-27T23:47:39Z | |
dc.date.available | 2021-10-27T23:47:39Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/34464 | |
dc.source | IIOimport | |
dc.title | Knowledge is power: systematic reuse of privacy knowledge for threat elicitation | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Joosen, Wouter | |
dc.date.embargo | 9999-12-31 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 1 | |
dc.source.endpage | 4 | |
dc.source.conference | International Workshop on Privacy Engineering 2019 | |
dc.source.conferencedate | 23/05/2018 | |
dc.source.conferencelocation | San Fransisco, CA USA | |
dc.identifier.url | https://ieeexplore.ieee.org/document/8844639 | |
imec.availability | Published - imec |