Login / Signup
Empirical evaluation of a privacy-focused threat modeling methodology.
Kim Wuyts
Riccardo Scandariato
Wouter Joosen
Published in:
J. Syst. Softw. (2014)
Keyphrases
</>
empirical evaluation
privacy preserving
genetic algorithm
modeling framework
privacy protection
legal issues
machine learning
search engine
information systems
modeling language
modeling method
applying data mining