Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools
102
click to vote
RE
2015
Springer
17
views
Software Engineering
»
more
RE 2015
»
A descriptive study of Microsoft's threat modeling technique
9 years 11 months ago
Download
lirias.kuleuven.be
Riccardo Scandariato, Kim Wuyts, Wouter Joosen
Real-time Traffic
RE 2015
|
Software Engineering
|
claim paper
Related Content
»
A Study of MalcodeBearing Documents
»
Dynamic program analysis of Microsoft Windows applications
»
Security Test Generation Using Threat Trees
»
Constructing Use Case Model by Using a Systematic Approach Description of a Study
»
Adapting Optimization Techniques to Description Logics with Concrete Domains
»
ModelChecking DoS Amplification for VoIP Session Initiation
»
A Study of Architecture Description Languages from a Modelbased Perspective
»
Case Study on Extending Internet of Services Techniques to RealWorld Services
»
Bayesian topic models for describing computer network behaviors
»
Layered participatory analysis new developments in the CARD technique
more »
Post Info
More Details (n/a)
Added
17 Apr 2016
Updated
17 Apr 2016
Type
Journal
Year
2015
Where
RE
Authors
Riccardo Scandariato, Kim Wuyts, Wouter Joosen
Comments
(0)
Researcher Info
Software Engineering Study Group
Computer Vision