Show simple item record

dc.contributor.authorSion, Laurens
dc.contributor.authorYskout, Koen
dc.contributor.authorVan landuyt, Dimitri
dc.contributor.authorVan den Berghe, Alexander
dc.contributor.authorJoosen, Wouter
dc.date.accessioned2021-10-29T04:19:03Z
dc.date.available2021-10-29T04:19:03Z
dc.date.issued2020
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/35964
dc.sourceIIOimport
dc.titleSecurity threat modeling: Are data flow diagrams enough?
dc.typeProceedings paper
dc.contributor.imecauthorJoosen, Wouter
dc.date.embargo9999-12-31
dc.source.peerreviewyes
dc.source.beginpage254
dc.source.endpage257
dc.source.conference1st International Workshop on Engineering and Cybersecurity of Critical Systems - EnCyCriS
dc.source.conferencedate23/05/2020
dc.source.conferencelocationSeoul South-korea
dc.identifier.urlhttps://doi.org/10.1145/3387940.3392221
imec.availabilityPublished - open access
imec.internalnotesICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops aff ok


Files in this item

Thumbnail

This item appears in the following collection(s)

Show simple item record