[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review

SM Khalil, H Bahsi, T Korõtko - Computers & Security, 2024 - Elsevier
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …

[HTML][HTML] Threat modeling of cyber-physical systems-a case study of a microgrid system

SM Khalil, H Bahsi, H Ochieng'Dola, T Korõtko… - Computers & …, 2023 - Elsevier
Cyber threat modeling is an analytical process that is used for identifying the potential
threats against a system and supporting the selection of security requirements in the early …

On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review

S Wairimu, LH Iwaya, L Fritsch, S Lindskog - IEEE Access, 2024 - ieeexplore.ieee.org
Assessing privacy risks and incorporating privacy measures from the onset requires a
comprehensive understanding of potential impacts on data subjects. Privacy Impact …

Linddun go: A lightweight approach to privacy threat modeling

K Wuyts, L Sion, W Joosen - 2020 IEEE European Symposium …, 2020 - ieeexplore.ieee.org
Realizing privacy-preserving software requires the application of principles such as Privacy
by Design (PbD) which require the consideration of privacy early on in the software …

A threat-based cybersecurity risk assessment approach addressing SME needs

M Van Haastrecht, I Sarhan, A Shojaifar… - Proceedings of the 16th …, 2021 - dl.acm.org
Cybersecurity incidents are commonplace nowadays, and Small-and Medium-Sized
Enterprises (SMEs) are exceptionally vulnerable targets. The lack of cybersecurity resources …

Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective

N Azam, L Michala, S Ansari… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …

Will they use it or not? Investigating software developers' intention to follow privacy engineering methodologies

A Senarath, M Grobler, NAG Arachchilage - ACM Transactions on …, 2019 - dl.acm.org
With the increasing concerns over privacy in software systems, there is a growing
enthusiasm to develop methods to support the development of privacy aware software …

Flaws in flows: Unveiling design flaws via information flow analysis

K Tuma, R Scandariato, M Balliu - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
This paper presents a practical and formal approach to analyze security-centric information
flow policies at the level of the design model. Specifically, we focus on data confidentiality …

Who should have access to my pointing data? privacy tradeoffs of adaptive assistive technologies

F Hamidi, K Poneres, A Massey, A Hurst - Proceedings of the 20th …, 2018 - dl.acm.org
Customizing assistive technologies based on user needs, abilities, and preferences is
necessary for accessibility, especially for individuals whose abilities vary due to a diagnosis …

Towards security threats that matter

K Tuma, R Scandariato, M Widman… - … Security: ESORICS 2017 …, 2018 - Springer
Architectural threat analysis is a pillar of security by design and is routinely performed in
companies. STRIDE is a well-known technique that is predominantly used to this aim. This …