Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,515,995 papers from all fields of science
Search
Sign In
Create Free Account
Threat model
Known as:
Threat modeling
, Threat modelling
Threat modeling is a process by which potential threats can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
ARM architecture
Abuse case
Agile software development
Attack tree
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Comparative analysis of cloud data integrity auditing protocols
N. Garg
,
S. Bawa
Journal of Network and Computer Applications
2016
Corpus ID: 46150241
2015
2015
LTPPM: a location and trajectory privacy protection mechanism in participatory sensing
Sheng Gao
,
Jianfeng Ma
,
Weisong Shi
,
Guoxing Zhan
Wireless Communications and Mobile Computing
2015
Corpus ID: 14264155
The ubiquity of mobile devices has facilitated the prevalence of participatory sensing, whereby ordinary citizens use their…
Expand
2012
2012
Supporting threat analysis through description logic reasoning
Jean Roy
,
A. B. Guyard
Conference on Cognitive and Computational Aspects…
2012
Corpus ID: 7981917
This paper describes an existing proof-of-concept prototype of an automated reasoning service exploiting ontologies expressed in…
Expand
2008
2008
A Unified Threat Model for Assessing Threat in Web Applications
Xiaohong Li
,
Ke He
International Symposium on Algorithms
2008
Corpus ID: 2605680
This paper presents a unified threat model for assessing threat in web applications. We extend the threat tree model with more…
Expand
Review
2006
Review
2006
The role of behavioral research and profiling in malicious cyber insider investigations
E. Shaw
Digital Investigation. The International Journal…
2006
Corpus ID: 30624967
2004
2004
Correlations among Extinction Risks Assessed by Different Systems of Threatened Species Categorization
Julian J. O'Grady
,
M. Burgman
,
+6 authors
R. Frankham
2004
Corpus ID: 14613408
Abstract: Many different systems are used to assess levels of threat faced by species. Prominent ones are those used by the…
Expand
Highly Cited
2003
Highly Cited
2003
Wireless Security Is Different
W. Arbaugh
Computer
2003
Corpus ID: 206446994
Wireless security requires slightly different thinking from wired security because it gives potential attackers easy transport…
Expand
2003
2003
How Effective Is Green Regulatory Threat
Werner Antweiler
2003
Corpus ID: 9345700
Governments use ‘green’ regulatory threat as an instrument to induce ‘voluntary’ pollution abatement by firms. If threats suffice…
Expand
2001
2001
Ephemeris Protection Level Equations and Monitor Algorithms for GBAS
S. Pullen
,
Jiyun Lee
,
M. Luo
,
B. Pervan
,
Fang-Cheng Chan
,
L. Gratton
2001
Corpus ID: 15894654
The authors would like to thank Todd Walter and Gang Xie for their help during this research. This work was also supported by…
Expand
Highly Cited
1995
Highly Cited
1995
The dual effect of stickleback nuptial coloration on rivals: manipulation of a graded signal using video playback
W. Rowland
,
K. Bolyard
,
Alison D. Halpern
Animal Behaviour
1995
Corpus ID: 53169862
Abstract Reproductive male three-spined stickleback, Gasterosteus aculeatus , were presented with pairs of videotaped images of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE