Login / Signup
Two Architectural Threat Analysis Techniques Compared.
Katja Tuma
Riccardo Scandariato
Published in:
ECSA (2018)
Keyphrases
</>
databases
data sets
search engine
social networks
decision trees
image sequences
multiresolution
significant improvement
special case
statistical analysis