Integrating risk assessment and threat modeling within SDLC process
暂无分享,去创建一个
[1] Adam Shostack,et al. Experiences Threat Modeling at Microsoft , 2008, MODSEC@MoDELS.
[2] Vadim Okun,et al. Web Application Scanners: Definitions and Functions , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[3] Eugene H. Spafford,et al. Understanding insiders: An analysis of risk-taking behavior , 2013, Inf. Syst. Frontiers.
[4] Wouter Joosen,et al. A descriptive study of Microsoft’s threat modeling technique , 2015, Requirements Engineering.
[5] Peter Torr,et al. Demystifying the threat modeling process , 2005, IEEE Security & Privacy Magazine.
[6] Michael Howard,et al. The security development lifecycle : SDL, a process for developing demonstrably more secure software , 2006 .
[7] Martin Höst,et al. A case study on software risk analysis and planning in medical device development , 2014, Software Quality Journal.
[8] Danny Dhillon,et al. Developer-Driven Threat Modeling: Lessons Learned in the Trenches , 2011, IEEE Security & Privacy.