Subject
Hardware and Architecture,Information Systems,Software
Reference100 articles.
1. Modeling security threat patterns to derive negative scenarios;Abe,2013
2. Analyzing security architectures;Abi-Antoun,2010
3. Agadakos, I., Chen, C.-Y., Campanelli, M., Anantharaman, P., Hasan, M., Copos, B., Lepoint, T., Locasto, M., Ciocarlie, G. F., Lindqvist, U., 2017. Jumping the air gap: Modeling cyber-physical a ACK paths in the internet-of-things.
4. Automated software architecture security risk analysis using formalized signatures;Almorsy,2013
5. Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps;Arzt;ACM Sigplan Notices,2014
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献