Notice
This item has not yet been validated by imec staff.
Notice
This is not the latest version of this item. The latest version can be found at: https://imec-publications.be/handle/20.500.12860/37703.2
Threat modeling: from infancy to maturity
dc.contributor.author | Yskout, Koen | |
dc.contributor.author | Heyman, Thomas | |
dc.contributor.author | Van Landuyt, Dimitri | |
dc.contributor.author | Sion, Laurens | |
dc.contributor.author | Wuyts, Kim | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2021-11-02T15:58:39Z | |
dc.date.available | 2021-11-02T15:58:39Z | |
dc.date.issued | 2020 | |
dc.identifier.other | WOS:000670587700003 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/37703 | |
dc.source | WOS | |
dc.title | Threat modeling: from infancy to maturity | |
dc.type | Proceedings paper | |
dc.contributor.orcidext | Yskout, Koen::0000-0002-9192-9100 | |
dc.contributor.orcidext | Van Landuyt, Dimitri::0000-0001-6597-2271 | |
dc.contributor.orcidext | Sion, Laurens::0000-0002-8126-4491 | |
dc.contributor.orcidext | Wuyts, Kim::0000-0002-0950-9490 | |
dc.identifier.doi | 10.1145/3377816.3381741 | |
dc.identifier.eisbn | 978-1-4503-7126-1 | |
dc.source.numberofpages | 4 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 9 | |
dc.source.endpage | 12 | |
dc.source.conference | 42nd IEEE/ACM International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER) | |
dc.source.conferencedate | JUN 27-JUL 19, 2020 | |
dc.source.conferencelocation | Seoul | |
imec.availability | Under review |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |