[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
[HTML][HTML] Threat modeling of cyber-physical systems-a case study of a microgrid system
Cyber threat modeling is an analytical process that is used for identifying the potential
threats against a system and supporting the selection of security requirements in the early …
threats against a system and supporting the selection of security requirements in the early …
On the Evaluation of Privacy Impact Assessment and Privacy Risk Assessment Methodologies: A Systematic Literature Review
Assessing privacy risks and incorporating privacy measures from the onset requires a
comprehensive understanding of potential impacts on data subjects. Privacy Impact …
comprehensive understanding of potential impacts on data subjects. Privacy Impact …
Linddun go: A lightweight approach to privacy threat modeling
Realizing privacy-preserving software requires the application of principles such as Privacy
by Design (PbD) which require the consideration of privacy early on in the software …
by Design (PbD) which require the consideration of privacy early on in the software …
A threat-based cybersecurity risk assessment approach addressing SME needs
Cybersecurity incidents are commonplace nowadays, and Small-and Medium-Sized
Enterprises (SMEs) are exceptionally vulnerable targets. The lack of cybersecurity resources …
Enterprises (SMEs) are exceptionally vulnerable targets. The lack of cybersecurity resources …
Data privacy threat modelling for autonomous systems: A survey from the gdpr's perspective
Artificial Intelligence-based applications have been increasingly deployed in every field of
life including smart homes, smart cities, healthcare services, and autonomous systems …
life including smart homes, smart cities, healthcare services, and autonomous systems …
Will they use it or not? Investigating software developers' intention to follow privacy engineering methodologies
With the increasing concerns over privacy in software systems, there is a growing
enthusiasm to develop methods to support the development of privacy aware software …
enthusiasm to develop methods to support the development of privacy aware software …
Flaws in flows: Unveiling design flaws via information flow analysis
This paper presents a practical and formal approach to analyze security-centric information
flow policies at the level of the design model. Specifically, we focus on data confidentiality …
flow policies at the level of the design model. Specifically, we focus on data confidentiality …
Who should have access to my pointing data? privacy tradeoffs of adaptive assistive technologies
Customizing assistive technologies based on user needs, abilities, and preferences is
necessary for accessibility, especially for individuals whose abilities vary due to a diagnosis …
necessary for accessibility, especially for individuals whose abilities vary due to a diagnosis …
Towards security threats that matter
K Tuma, R Scandariato, M Widman… - … Security: ESORICS 2017 …, 2018 - Springer
Architectural threat analysis is a pillar of security by design and is routinely performed in
companies. STRIDE is a well-known technique that is predominantly used to this aim. This …
companies. STRIDE is a well-known technique that is predominantly used to this aim. This …