"A descriptive study of Microsoft's threat modeling technique."

Riccardo Scandariato, Kim Wuyts, Wouter Joosen (2015)

Details and statistics

DOI: 10.1007/S00766-013-0195-2

access: closed

type: Journal Article

metadata version: 2021-10-14

a service of  Schloss Dagstuhl - Leibniz Center for Informatics