[HTML][HTML] A survey on threat-modeling techniques: protected objects and classification of threats

A Konev, A Shelupanov, M Kataev, V Ageeva… - Symmetry, 2022 - mdpi.com
Information security is one of the most important attributes of distributed systems that often
operate on unreliable networks. Enabling security features during the development of a …

[PDF][PDF] Model-based Threat and Risk Assessment for Systems Design.

A Shaked, Y Reich - ICISSP, 2021 - scitepress.org
Integrating cybersecurity considerations in the design of modern systems is a significant
challenge. As systems increasingly rely on connectivity and software to perform …

Threat modeling tools: A taxonomy

Z Shi, K Graffi, D Starobinski… - IEEE Security & …, 2021 - ieeexplore.ieee.org
Threat Modeling Tools: A Taxonomy Page 1 THREAT MODELING TOOLS Threat Modeling
Tools A Taxonomy Zhenpeng Shi | Boston University Kalman Graffi | Honda Research Institute …

An extensible pattern-based library and taxonomy of security threats for distributed systems

AV Uzunov, EB Fernandez - Computer Standards & Interfaces, 2014 - Elsevier
Security is one of the most essential quality attributes of distributed systems, which often
operate over untrusted networks such as the Internet. To incorporate security features during …

Evaluation of threat modeling methodologies

J Selin - 2019 - theseus.fi
An interconnected world with an increasing number of systems, products and services
relying on the availability, confidentiality, and integrity of sensitive information is vulnerable …

[PDF][PDF] Modeling security risk assessments

D Angermeier, K Beilke, G Hansch, J Eichler - 2019 - researchgate.net
Security Risk Assessment is an important task in systems engineering and used to derive
security requirements for a secure system design and the evaluation of design alternatives …

Threat modeling–A systematic literature review

W Xiong, R Lagerström - Computers & security, 2019 - Elsevier
Cyber security is attracting worldwide attention. With attacks being more and more common
and often successful, no one is spared today. Threat modeling is proposed as a solution for …

[HTML][HTML] A model-based methodology to support systems security design and assessment

A Shaked - Journal of Industrial Information Integration, 2023 - Elsevier
Addressing cybersecurity aspects while designing systems is challenging. As our systems
increasingly rely on digital technology to perform, security and resilience aspects need to be …

Engineering security into distributed systems: A survey of methodologies

A Uzunov, E Fernandez, K Falkner - 2012 - hekyll.services.adelaide.edu.au
Rapid technological advances in recent years have precipitated a general shift towards
software distribution as a central computing paradigm. This has been accompanied by a …

A review of asset-centric threat modelling approaches

LO Nweke, S Wolthusen - 2020 - ntnuopen.ntnu.no
The threat landscape is constantly evolving. As attackers continue to evolve and seek better
methods of compro-mising a system; in the same way, defenders continue to evolve and …