Login / Signup

Demystifying the Threat-Modeling Process.

Peter Torr
Published in: IEEE Secur. Priv. (2005)
Keyphrases
  • wide range
  • data mining
  • machine learning
  • case study
  • bayesian networks
  • natural language
  • digital libraries
  • expert systems
  • software engineering
  • metamodel
  • modeling framework