Showing 1 - 1 results of 1 for search '"Misuse case"', query time: 0.06s Refine Results
  1. 1

    Moth: a hybrid threat model for improving software security testing by Omotunde, Habeeb Oladapo

    Published 2018
    “…This involved the combination of 3 threat modeling techniques namely misuse cases, attack trees and finite state machines in order to harness their individual strengths to design a Hybrid Threat Modeling framework and tool called MOTH (Modeling Threats using Hybrid techniques). …”
    Get full text
    Get full text
    Get full text
    Thesis