2007 | ||
---|---|---|
2 | EE | Marwan Abi-Antoun, Daniel Wang, Peter Torr: Checking threat modeling data flow diagrams for implementation conformance and security. ASE 2007: 393-396 |
2005 | ||
1 | EE | Peter Torr: Demystifying the Threat-Modeling Process. IEEE Security & Privacy 3(5): 66-70 (2005) |
1 | Marwan Abi-Antoun | [2] |
2 | Daniel Wang | [2] |