Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/ieeesp/StevensVRAM19
%A Stevens, Rock
%A Votipka, Daniel
%A Redmiles, Elissa M.
%A Ahern, Colin
%A Mazurek, Michelle L.
%D 2019
%J IEEE Security & Privacy
%K dblp
%N 4
%P 35-42
%T Applied Digital Threat Modeling: It Works.
%U http://dblp.uni-trier.de/db/journals/ieeesp/ieeesp17.html#StevensVRAM19
%V 17
@article{journals/ieeesp/StevensVRAM19,
added-at = {2019-08-08T00:00:00.000+0200},
author = {Stevens, Rock and Votipka, Daniel and Redmiles, Elissa M. and Ahern, Colin and Mazurek, Michelle L.},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/2bba14ebcf0c21aca07b979da7a44c1a0/dblp},
ee = {https://doi.org/10.1109/MSEC.2019.2909714},
interhash = {e97a3e02e24dea3e47004fd7f37946ed},
intrahash = {bba14ebcf0c21aca07b979da7a44c1a0},
journal = {IEEE Security & Privacy},
keywords = {dblp},
number = 4,
pages = {35-42},
timestamp = {2019-09-27T10:37:52.000+0200},
title = {Applied Digital Threat Modeling: It Works.},
url = {http://dblp.uni-trier.de/db/journals/ieeesp/ieeesp17.html#StevensVRAM19},
volume = 17,
year = 2019
}