Login / Signup

Two Architectural Threat Analysis Techniques Compared.

Katja TumaRiccardo Scandariato
Published in: ECSA (2018)
Keyphrases
  • databases
  • data sets
  • search engine
  • social networks
  • decision trees
  • image sequences
  • multiresolution
  • significant improvement
  • special case
  • statistical analysis