Author:
Sion Laurens,Van Landuyt Dimitri,Yskout Koen,Verreydt Stef,Joosen Wouter
Publisher
Springer Nature Switzerland
Reference60 articles.
1. Audodesk: Autodesk Continuous Threat Modeling (2021). https://github.com/Autodesk/continuous-threat-modeling/
2. S. Bellovin, On the brittleness of software and the infeasibility of security metrics. IEEE Secur. Priv. 4(4), 96–96 (2006). https://doi.org/10.1109/MSP.2006.101
3. Z. Braiterman, A. Shostack, J. Marcil, S. de de Vries, I. Michlin, K. Wuyts, R. Hurlbut, B.S. Schoenfield, F. Scott, M. Coles, C. Romeo, A. Miller, I. Tarandach, A. Douglen, M. French, Threat Modeling Manifesto (2020). https://www.threatmodelingmanifesto.org/
4. F. Brosig, N. Huber, S. Kounev, Automated extraction of architecture-level performance models of distributed component-based systems, in 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011) (IEEE, 2011), pp. 183–192
5. J. Buckley, S. Mooney, J. Rosik, N. Ali, JITTAC: a just-in-time tool for architectural consistency, in 2013 35th International Conference on Software Engineering (ICSE) (2013), pp. 1291–1294. https://doi.org/10.1109/ICSE.2013.6606700