Notice

This item has not yet been validated by imec staff.

Notice

This is not the latest version of this item. The latest version can be found at: https://imec-publications.be/handle/20.500.12860/37703.2

Show simple item record

dc.contributor.authorYskout, Koen
dc.contributor.authorHeyman, Thomas
dc.contributor.authorVan Landuyt, Dimitri
dc.contributor.authorSion, Laurens
dc.contributor.authorWuyts, Kim
dc.contributor.authorJoosen, Wouter
dc.date.accessioned2021-11-02T15:58:39Z
dc.date.available2021-11-02T15:58:39Z
dc.date.issued2020
dc.identifier.otherWOS:000670587700003
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/37703
dc.sourceWOS
dc.titleThreat modeling: from infancy to maturity
dc.typeProceedings paper
dc.contributor.orcidextYskout, Koen::0000-0002-9192-9100
dc.contributor.orcidextVan Landuyt, Dimitri::0000-0001-6597-2271
dc.contributor.orcidextSion, Laurens::0000-0002-8126-4491
dc.contributor.orcidextWuyts, Kim::0000-0002-0950-9490
dc.identifier.doi10.1145/3377816.3381741
dc.identifier.eisbn978-1-4503-7126-1
dc.source.numberofpages4
dc.source.peerreviewyes
dc.source.beginpage9
dc.source.endpage12
dc.source.conference42nd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)
dc.source.conferencedateJUN 27-JUL 19, 2020
dc.source.conferencelocationSeoul
imec.availabilityUnder review


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version