共 50 条
- [21] A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
- [22] Android Run-time Permission Exploitation User Awareness by Means of Formal Methods ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 804 - 814
- [29] Risk Identification: From Requirements to Threat Models ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 385 - 396
- [30] Risk Assessment of Sharing Cyber Threat Intelligence COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113