Login / Signup
Demystifying the Threat-Modeling Process.
Peter Torr
Published in:
IEEE Secur. Priv. (2005)
Keyphrases
</>
wide range
data mining
machine learning
case study
bayesian networks
natural language
digital libraries
expert systems
software engineering
metamodel
modeling framework