Login / Signup
Adversary Centered Design: Threat Modeling Using Anti-Scenarios, Anti-Use Cases and Anti-Personas.
Adam Steele
Xiaoping Jia
Published in:
IKE (2008)
Keyphrases
</>
centered design
real time
security protection
databases
website
case base