Threat modeling–A systematic literature review
W Xiong, R Lagerström - Computers & security, 2019 - Elsevier
Cyber security is attracting worldwide attention. With attacks being more and more common
and often successful, no one is spared today. Threat modeling is proposed as a solution for …
and often successful, no one is spared today. Threat modeling is proposed as a solution for …
Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
Chatbots: Security, privacy, data protection, and social aspects
M Hasal, J Nowaková, K Ahmed Saghair… - Concurrency and …, 2021 - Wiley Online Library
Chatbots are artificial communication systems becoming increasingly popular and not all
their security questions are clearly solved. People use chatbots for assistance in shopping …
their security questions are clearly solved. People use chatbots for assistance in shopping …
A design space for effective privacy notices
F Schaub, R Balebako, AL Durity… - Eleventh symposium on …, 2015 - usenix.org
Notifying users about a system's data practices is supposed to enable users to make
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy …
Ethical and privacy principles for learning analytics
The massive adoption of technology in learning processes comes with an equally large
capacity to track learners. Learning analytics aims at using the collected information to …
capacity to track learners. Learning analytics aims at using the collected information to …
Metaverse communications, networking, security, and applications: Research issues, state-of-the-art, and future directions
Metaverse is an evolving orchestrator of the next-generation Internet architecture that
produces an immersive and self-adapting virtual world in which humans perform activities …
produces an immersive and self-adapting virtual world in which humans perform activities …
Privacy and data protection by design-from policy to engineering
G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …
There have been decades of debate on how those values-and legal obligations-can be …
Security and privacy approaches in mixed reality: A literature survey
JA De Guzman, K Thilakarathna… - ACM Computing Surveys …, 2019 - dl.acm.org
Mixed reality (MR) technology development is now gaining momentum due to advances in
computer vision, sensor fusion, and realistic display technologies. With most of the research …
computer vision, sensor fusion, and realistic display technologies. With most of the research …
[PDF][PDF] Threat modeling: a summary of available methods
N Shevchenko, TA Chick, P O'Riordan… - Software Engineering …, 2018 - modeler.org.cn
“Threat modeling is the key to a focused defense. Without threat modeling, you can never
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …
stop playing whack-a-mole.”—Adam Shostack [14] Almost all software systems today face a …
[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …