Login / Signup

Finding security threats that matter: Two industrial case studies.

Katja TumaChristian SandbergUrban ThorssonMathias WidmanThomas HerpelRiccardo Scandariato
Published in: J. Syst. Softw. (2021)
Keyphrases
  • security threats
  • case study
  • security issues
  • security mechanisms
  • key management
  • security risks
  • data sets
  • real world
  • peer to peer