Sign in

Threat modeling: from infancy to maturity.

Koen YskoutThomas HeymanDimitri Van LanduytLaurens SionKim WuytsWouter Joosen
Published in: ICSE (NIER) (2020)
Keyphrases
  • data sets
  • clustering algorithm
  • multiscale
  • optimal solution
  • expert systems
  • sir model