Threat model

Results: 162



#Item
41Representing Humans in System Security Models: An Actor-Network Approach Wolter Pieters University of Twente Enschede, The Netherlands

Representing Humans in System Security Models: An Actor-Network Approach Wolter Pieters University of Twente Enschede, The Netherlands

Add to Reading List

Source URL: isyou.info

Language: English - Date: 2011-08-07 11:38:37
42Threat Analysis for the Transport of Radioactive Material Adapted from a paper presented at the 15th International Symposium on the Packaging and Transportation of Radioactive Materials [PATRAM 2007, Miami] [Also publish

Threat Analysis for the Transport of Radioactive Material Adapted from a paper presented at the 15th International Symposium on the Packaging and Transportation of Radioactive Materials [PATRAM 2007, Miami] [Also publish

Add to Reading List

Source URL: www.swemorph.com

Language: English - Date: 2011-03-24 09:26:29
43Eleanor Saitta Objective: Experience:

Eleanor Saitta Objective: Experience:

Add to Reading List

Source URL: dymaxion.org

Language: English - Date: 2015-01-28 07:38:29
44Representing Humans in System Security Models: An Actor-Network Approach Wolter Pieters University of Twente Enschede, The Netherlands

Representing Humans in System Security Models: An Actor-Network Approach Wolter Pieters University of Twente Enschede, The Netherlands

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2011-08-07 11:38:37
45Threat / Diagram / Scientific modelling / Science / Epistemology / Computer security / Cyberwarfare / Threat model

The Trouble with Threat Modeling   Adam Shostack here. I said recently that I wanted to talk more about what I do. The core of what I do is help Microsoft’s product teams analyze the security of their designs by thr

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:56:21
46The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond  Software security model

The Slingshot Project Measuring, analyzing, and defending against targeted attacks Stevens Le Blond Software security model

Add to Reading List

Source URL: www.dfn-cert.de

Language: English - Date: 2015-03-06 09:40:10
47Towards a quantitative assessment of security in software architectures Artsiom Yautsiukhin2∗ Riccardo Scandariato2 Thomas Heyman2

Towards a quantitative assessment of security in software architectures Artsiom Yautsiukhin2∗ Riccardo Scandariato2 Thomas Heyman2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2010-06-18 12:29:02
48Life in the Digital Crosshairs  The dawn of the Microsoft Security Development Lifecycle The dawn of Microsoft Trustworthy Computing

Life in the Digital Crosshairs The dawn of the Microsoft Security Development Lifecycle The dawn of Microsoft Trustworthy Computing

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-20 17:31:10
49Data Sheet  McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
50Data Sheet  McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17