ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
0
views
0
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,545
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Risk Centric Threat Modeling : Process for Attack Simulation and Threat Analysis
other
Author(s):
Tony Ucedavélez
,
Marco M. Morana
Publication date
(Print):
June 08 2015
Publisher:
John Wiley & Sons, Inc
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Reviews of mathematical modeling in cancer
Author and book information
Book
ISBN (Electronic):
9781118988374
ISBN (Print):
9780470500965
Publication date (Print):
June 08 2015
DOI:
10.1002/9781118988374
SO-VID:
239ce3ad-800b-4391-aaea-3c4ccc066194
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. i
Front Matter
pp. 1
Threat Modeling Overview
pp. 63
Objectives and Benefits of Threat Modeling
pp. 137
Existing Threat Modeling Approaches
pp. 195
Threat Modeling within the SDLC
pp. 235
Threat Modeling and Risk Management
pp. 317
Intro to Pasta
pp. 343
Diving Deeper into Pasta
pp. 479
Pasta Use Case
pp. 633
Glossary
pp. 653
References
pp. 657
Index
Similar content
4,545
A User-Centric View of Intelligent Environments: User Expectations, User Experience and User Role in Building Intelligent Environments
Authors:
Eija Kaasinen
,
Tiina Kymäläinen
,
Marketta Niemelä
…
Supporting smart electric vehicle charging with information-centric networking
Authors:
Barbara S. Vieira
,
George Pavlou
,
Konstantinos Katsaros
…
Receiver-centric Buffer Blocking-aware Multipath Data Distribution in MPTCP-based Heterogeneous Wireless Networks
Authors:
See all similar
Cited by
5
Two Architectural Threat Analysis Techniques Compared
Authors:
Katja Tuma
,
Riccardo Scandariato
Machine-Generated Text: A Comprehensive Survey of Threat Models and Detection Methods
Authors:
Evan N. Crothers
,
Nathalie Japkowicz
,
Herna L. Viktor
Cybersecurity in the Smart Grid: Vulnerabilities, Threats, and Countermeasures
Authors:
Jordan Y. Arpilleda
See all cited by