Threat model

Results: 162



#Item
1eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1  Institute for Internet Security, University of Applied Sciences Gelsenkirchen

eID Online Authentication Network Threat Model, Attacks and Implications Christian Rossow1,2 , Christian J. Dietrich1,3 , Norbert Pohlmann1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:18:07
2Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
3Microsoft PowerPoint - DenimGroup_JumpStartYourApplicationSecurityKnowledge_Content.pptx

Microsoft PowerPoint - DenimGroup_JumpStartYourApplicationSecurityKnowledge_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:55
4Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

Microsoft PowerPoint - OWASP_SanAntonio_February2006_SecondMostSecureDatabase.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:30:26
5ISSA  ISSA Journal | November 2009 The Global Voice of Information Security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
6Child Maltreatment and Autonomic Nervous System Reactivity: Identifying Dysregulated Stress Reactivity Patterns by Using the Biopsychosocial Model of Challenge and Threat KATIE A. MCLAUGHLIN, PHD, MARGARET A. SHERIDAN, P

Child Maltreatment and Autonomic Nervous System Reactivity: Identifying Dysregulated Stress Reactivity Patterns by Using the Biopsychosocial Model of Challenge and Threat KATIE A. MCLAUGHLIN, PHD, MARGARET A. SHERIDAN, P

Add to Reading List

Source URL: wendyberrymendes.com

Language: English - Date: 2016-03-10 16:22:32
    7ARTICLE IN PRESS  G Model JEBO-2771; No. of Pages 7  Journal of Economic Behavior & Organization xxxxxx–xxx

    ARTICLE IN PRESS G Model JEBO-2771; No. of Pages 7 Journal of Economic Behavior & Organization xxxxxx–xxx

    Add to Reading List

    Source URL: pareto.uab.es

    Language: English - Date: 2011-08-31 05:28:50
    8SANDIA REPORT SAND2007-5791 Unlimited Release Printed SeptemberCategorizing Threat

    SANDIA REPORT SAND2007-5791 Unlimited Release Printed SeptemberCategorizing Threat

    Add to Reading List

    Source URL: www.idart.sandia.gov

    Language: English - Date: 2009-05-07 12:36:27
    9Secure Untrusted Data Repository (SUNDR) Li, Krohn, Mazieres, and Shasha Why did I assign this paper? • very different threat model, one that is becoming more and more relevant because of cloud. still learning the fund

    Secure Untrusted Data Repository (SUNDR) Li, Krohn, Mazieres, and Shasha Why did I assign this paper? • very different threat model, one that is becoming more and more relevant because of cloud. still learning the fund

    Add to Reading List

    Source URL: courses.cs.washington.edu

    Language: English - Date: 2013-06-14 13:56:48
      10Experiences Threat Modeling at Microsoft Adam Shostack  Microsoft  Abstract. Describes a decade of experience threat modeling products

      Experiences Threat Modeling at Microsoft Adam Shostack Microsoft Abstract. Describes a decade of experience threat modeling products

      Add to Reading List

      Source URL: adam.shostack.org

      Language: English - Date: 2014-06-11 12:01:57