dc.contributor.author | Anh-Duy Tran | |
dc.contributor.author | Yskout, Koen | |
dc.contributor.author | Joosen, Wouter | |
dc.date.accessioned | 2025-06-17T12:12:11Z | |
dc.date.available | 2024-10-10T19:45:30Z | |
dc.date.available | 2025-06-17T12:12:11Z | |
dc.date.issued | 2024 | |
dc.identifier.isbn | 978-3-031-66325-3 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.other | WOS:001307877700008 | |
dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/44620.2 | |
dc.source | WOS | |
dc.title | Threat Modeling: A Rough Diamond or Fool's Gold? | |
dc.type | Proceedings paper | |
dc.contributor.imecauthor | Anh-Duy Tran | |
dc.contributor.imecauthor | Yskout, Koen | |
dc.contributor.imecauthor | Joosen, Wouter | |
dc.identifier.doi | 10.1007/978-3-031-66326-0_8 | |
dc.identifier.eisbn | 978-3-031-66326-0 | |
dc.source.numberofpages | 10 | |
dc.source.peerreview | yes | |
dc.source.beginpage | 120 | |
dc.source.endpage | 129 | |
dc.source.conference | 17th European Conference on Software Architecture (ECSA) | |
dc.source.conferencedate | SEP 18-22, 2023 | |
dc.source.conferencelocation | Istanbul | |
dc.source.journal | Lecture Notes in Computer Science | |
dc.source.volume | 14590 | |
imec.availability | Published - imec | |
dc.description.wosFundingText | This research is partially funded by the Research Fund KU Leuven, and by the Flemish Research Programme Cybersecurity. | |