Publisher
Springer International Publishing
Reference29 articles.
1. Microsoft Corporation, The STRIDE Threat Model (2016). https://docs.microsoft.com/en-us/previous-versions/commerce-server/ee823878(v=cs.20)
2. CORAS risk analysis methodology. https://coras.sourceforge.net
3. Abela, R.: Statistics show why wordpress is a popular hacker target (2020). https://www.wpwhitesecurity.com/statistics-70-percent-wordpress-installations-vulnerable/
4. Arsac, W., Bella, G., Chantry, X., Compagna, L.: Multi-attacker protocol validation. J. Autom. Reasoning 46(3–4), 353–388 (2011)
5. Caralli, R., Stevens, J., Young, L., Wilson, W.: Introducing octave allegro: improving the information security risk assessment process. Technical report CMU/SEI-2007-TR-012, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (2007). https://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=8419
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献