Cited By
View all- Gruner BRoychoudhury APaiva AAbreu RStorey M(2024)Accurate Architectural Threat Elicitation From Source Code Through Hybrid Information Flow AnalysisProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings10.1145/3639478.3639795(139-141)Online publication date: 14-Apr-2024
- Landuyt DSion LPhilips WJoosen W(2024)From automation to CI/CD: a comparative evaluation of threat modeling tools2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00010(35-45)Online publication date: 7-Oct-2024
- Gruner BHeckner SSonnekalb TBouhlal BBrust C(2024)Finding a Needle in a Haystack: Threat Analysis in Open-Source Projects2024 IEEE International Conference on Software Analysis, Evolution and Reengineering - Companion (SANER-C)10.1109/SANER-C62648.2024.00024(141-145)Online publication date: 12-Mar-2024
- Show More Cited By