Threat modeling–A systematic literature review

W Xiong, R Lagerström - Computers & security, 2019 - Elsevier
Cyber security is attracting worldwide attention. With attacks being more and more common
and often successful, no one is spared today. Threat modeling is proposed as a solution for …

Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Chatbots: Security, privacy, data protection, and social aspects

M Hasal, J Nowaková, K Ahmed Saghair… - Concurrency and …, 2021 - Wiley Online Library
Chatbots are artificial communication systems becoming increasingly popular and not all
their security questions are clearly solved. People use chatbots for assistance in shopping …

A design space for effective privacy notices

F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …

Ethical and privacy principles for learning analytics

A Pardo, G Siemens - British journal of educational technology, 2014 - Wiley Online Library
The massive adoption of technology in learning processes comes with an equally large
capacity to track learners. Learning analytics aims at using the collected information to …

Metaverse communications, networking, security, and applications: Research issues, state-of-the-art, and future directions

M Ali, F Naeem, G Kaddoum… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Metaverse is an evolving orchestrator of the next-generation Internet architecture that
produces an immersive and self-adapting virtual world in which humans perform activities …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

Security and privacy approaches in mixed reality: A literature survey

JA De Guzman, K Thilakarathna… - ACM Computing Surveys …, 2019 - dl.acm.org
Mixed reality (MR) technology development is now gaining momentum due to advances in
computer vision, sensor fusion, and realistic display technologies. With most of the research …

[PDF][PDF] Threat modeling: a summary of available methods

N Shevchenko, TA Chick, P O'Riordan… - Software Engineering …, 2018 - modeler.org.cn
“Threat modeling is the key to a focused defense. Without threat modeling, you can never
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …

[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2023 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …