dc.contributor.author | Sion, Laurens | |
dc.contributor.author | Yskout, Koen | |
dc.contributor.author | Van landuyt, Dimitri | |
dc.contributor.author | Van den Berghe, Alexander | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2021-10-29T04:19:03Z | |
dc.date.available | 2021-10-29T04:19:03Z | |
dc.date.issued | 2020 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/35964 | |
dc.source | IIOimport | |
dc.title | Security threat modeling: Are data flow diagrams enough? | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Joosen, Wouter | |
dc.date.embargo | 9999-12-31 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 254 | |
dc.source.endpage | 257 | |
dc.source.conference | 1st International Workshop on Engineering and Cybersecurity of Critical Systems - EnCyCriS | |
dc.source.conferencedate | 23/05/2020 | |
dc.source.conferencelocation | Seoul South-korea | |
dc.identifier.url | https://doi.org/10.1145/3387940.3392221 | |
imec.availability | Published - open access | |
imec.internalnotes | ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops aff ok | |