Cited By
View all- Wellßow AKohlisch-Posega JVeith EUslar M(2024)Threat Modeling for AI Analysis: Towards the Usage of Misuse Case Templates and UML Diagrams for AI Experiment Description and Trajectory GenerationProceedings of the 2024 13th International Conference on Informatics, Environment, Energy and Applications10.1145/3653912.3653915(7-16)Online publication date: 21-Feb-2024
- Chimuco FSequeiros JSimōes TFreire MInácio P(2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
- Broccia Gter Beek MLluch Lafuente ASpoletini PFerrari A(2024)Assessing the Understandability and Acceptance of Attack-Defense Trees for Modelling Security RequirementsRequirements Engineering: Foundation for Software Quality10.1007/978-3-031-57327-9_3(39-56)Online publication date: 8-Apr-2024
- Show More Cited By