Threat model

Known as: Threat modeling, Threat modelling 
Threat modeling is a process by which potential threats can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1988-2017
05010019882017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Practitioners and researchers have been thinking about, making presentations on, and publishing material related to threat… (More)
  • figure 1
Is this relevant?
2009
2009
Cross-Site Request Forgery (CSRF) vulnerability is extremely widespread and one of the top ten Web application vulnerabilities of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
2008
2008
Describes a decade of experience threat modeling products and services at Microsoft. Describes the current threat modeling… (More)
  • table 1
  • table 2
Is this relevant?
2007
2007
Threat modeling, which is the process of identifying, quantifying and analyzing potential threats of computer-based systems, has… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
In this paper, we propose a novel threat model-driven security testing approach for detecting undesirable threat behavior at… (More)
  • figure 1
Is this relevant?
2006
2006
Radio Frequency Identification (RFID) technology promises benefits that accrue from being able to identify and track individual… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We routinely hear vendors claim that their systems are “secure.” However, without knowing what assumptions are made by the vendor… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
In today's hostile online environment, software must be designed to withstand malicious attacks of all kinds. Unfortunately, even… (More)
  • figure 1
Is this relevant?
2005
2005
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for… (More)
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
  • Charles Lynn
  • IEEE Journal on Selected Areas in Communications
  • 1999
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems (ASes), is a… (More)
Is this relevant?