Login / Signup

Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon.

Erlend BygdåsLars Andreassen JaatunStian Brekken AntonsenAnders RingenErlend Eiring
Published in: CyberSA (2021)
Keyphrases
  • end users
  • decision support
  • countermeasures
  • business intelligence
  • software tools
  • neural network
  • search engine
  • information systems
  • web services
  • relational databases
  • object oriented
  • management tools
  • sir model