dc.contributor.author | Verreydt, Stef | |
dc.contributor.author | Sion, Laurens | |
dc.contributor.author | Yskout, Koen | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2022-12-09T11:05:15Z | |
dc.date.available | 2022-09-17T02:52:27Z | |
dc.date.available | 2022-12-09T11:05:15Z | |
dc.date.issued | 2022 | |
dc.identifier.issn | na | |
dc.identifier.other | WOS:000850572500006 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/40451.2 | |
dc.source | WOS | |
dc.title | Relationship-Based Threat Modeling | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Verreydt, Stef | |
dc.contributor.imecauthor | Sion, Laurens | |
dc.contributor.imecauthor | Yskout, Koen | |
dc.contributor.imecauthor | Joosen, Wouter | |
dc.identifier.doi | 10.1145/3524489.3527303 | |
dc.identifier.eisbn | 978-1-4503-9290-7 | |
dc.source.numberofpages | 8 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 41 | |
dc.source.endpage | 48 | |
dc.source.conference | 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) | |
dc.source.conferencedate | MAY 16, 2022 | |
dc.source.conferencelocation | Pittsburgh | |
dc.source.journal | na | |
imec.availability | Published - open access | |
dc.description.wosFundingText | This research is partially funded by the Flemish Research Programme Cybersecurity and the KU Leuven C2-ePIC project. | |