Threat Modeling as a Basis for Security Requirements
暂无分享,去创建一个
[1] Yifan Li,et al. VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.
[2] Gregory A. Koenig,et al. Cluster security with NVisionCC: process monitoring by leveraging emergent properties , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[3] Gregory A. Koenig,et al. Detection of Privilege Escalation for Linux Cluster Security , 2005 .
[4] Mario Silva-Neto,et al. Netflow services and applications , 2002 .
[5] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[6] Frank Swiderski,et al. Threat Modeling , 2018, Hacking Connected Cars.
[7] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[8] Ian Sommerville,et al. Requirements Engineering: Processes and Techniques , 1998 .
[9] Roy H. Campbell,et al. Threat analysis of GNU software radio , 2005 .