[HTML][HTML] A survey on threat-modeling techniques: protected objects and classification of threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - Symmetry, 2022 - mdpi.com
Information security is one of the most important attributes of distributed systems that often
operate on unreliable networks. Enabling security features during the development of a …

A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats.

A Konev, A Shelupanov, M Kataev… - Symmetry …, 2022 - search.ebscohost.com
Abstract Information security is one of the most important attributes of distributed systems
that often operate on unreliable networks. Enabling security features during the …

[PDF][PDF] A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats

A Konev, A Shelupanov, M Kataev… - Comput. Stand …, 2014 - researchgate.net
Information security is one of the most important attributes of distributed systems that often
operate on unreliable networks. Enabling security features during the development of a …

A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - …, 2022 - search.proquest.com
Abstract Information security is one of the most important attributes of distributed systems
that often operate on unreliable networks. Enabling security features during the …

A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - …, 2022 - ui.adsabs.harvard.edu
Abstract Information security is one of the most important attributes of distributed systems
that often operate on unreliable networks. Enabling security features during the …

[引用][C] A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - Symmetry, 2022 - elibrary.ru