Sign in

Effective and efficient privacy threat modeling through domain refinements.

Kim WuytsDimitri Van LanduytAram HovsepyanWouter Joosen
Published in: SAC (2018)
Keyphrases