Sion, LaurensLaurensSionYskout, KoenKoenYskoutVan landuyt, DimitriDimitriVan landuytVan den Berghe, AlexanderAlexanderVan den BergheJoosen, WouterWouterJoosen2021-10-292021-10-292020https://imec-publications.be/handle/20.500.12860/35964Security threat modeling: Are data flow diagrams enough?Proceedings paperhttps://doi.org/10.1145/3387940.3392221