Login / Signup

Exploring how experienced and unexperienced professionals use a privacy threat modeling methodology.

Andrey Antonio RodriguesMaria Lúcia Bento VillelaEduardo Feitosa
Published in: J. Interact. Syst. (2023)
Keyphrases