Login / Signup
Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon.
Erlend Bygdås
Lars Andreassen Jaatun
Stian Brekken Antonsen
Anders Ringen
Erlend Eiring
Published in:
CyberSA (2021)
Keyphrases
</>
end users
decision support
countermeasures
business intelligence
software tools
neural network
search engine
information systems
web services
relational databases
object oriented
management tools
sir model