Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Threat model

Known as: Threat modeling, Threat modelling 
Threat modeling is a process by which potential threats can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular… Expand
  • table I
  • table II
  • table III
  • figure 2
  • table IV
Is this relevant?
Review
2018
Review
2018
Safety and security have traditionally been distinct problems in engineering and computer science. The introduction of computing… Expand
  • figure 2
Is this relevant?
Review
2017
Review
2017
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2014
Highly Cited
2014
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied… Expand
Is this relevant?
Highly Cited
2013
Highly Cited
2013
This document gives additional security considerations for OAuth, beyond those in the OAuth 2.0 specification, based on a… Expand
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This article describes EMC/s real-world experiences with threat modeling, including major challenges encountered, lessons learned… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
This paper describes the development of the technology threat avoidance theory (TTAT), which explains individual IT users… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Describes a decade of experience threat modeling products and services at Microsoft. Describes the current threat modeling… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
A common practice for studying the risk to a business is based on risk management principles. I.e., security resources are… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • Peter Torr
  • IEEE Security & Privacy Magazine
  • 2005
  • Corpus ID: 38200990
In today's hostile online environment, software must be designed to withstand malicious attacks of all kinds. Unfortunately, even… Expand
  • figure 1
Is this relevant?