Methods, Methodologies, and Tools for Threat Modeling with Case Study

The security of each system is essential for its use. In order to make this process as successful as possible, it is advisable to develop a threat model for the system under consideration at the design stage. The purpose of the threat model is to enable the identification of security threats, by who...

Full description

Bibliographic Details
Main Authors: A. Hajrić, T. Smaka, S. Baraković, J. Baraković Husić
Format: Article
Language:English
Published: Telecommunications Society, Academic Mind 2020-07-01
Series:Telfor Journal
Subjects:
Online Access: http://journal.telfor.rs/Published/Vol12No1/Vol12No1_A11.pdf