![]() |
| 2007 | ||
|---|---|---|
| 2 | EE | Marwan Abi-Antoun, Daniel Wang, Peter Torr: Checking threat modeling data flow diagrams for implementation conformance and security. ASE 2007: 393-396 |
| 2005 | ||
| 1 | EE | Peter Torr: Demystifying the Threat-Modeling Process. IEEE Security & Privacy 3(5): 66-70 (2005) |
| 1 | Marwan Abi-Antoun | [2] |
| 2 | Daniel Wang | [2] |