Sign in

Security Threat Modeling: Are Data Flow Diagrams Enough?

Laurens SionKoen YskoutDimitri Van LanduytAlexander van Den BergheWouter Joosen
Published in: ICSE (Workshops) (2020)
Keyphrases