Cited By
View all- Chimuco FSequeiros JSimōes TFreire MInácio P(2024)Expediting the design and development of secure cloud-based mobile appsInternational Journal of Information Security10.1007/s10207-024-00880-623:4(3043-3064)Online publication date: 1-Aug-2024
- Rahim FJamil NCob ZSidek LSharizan@Sharizal N(2022)Risk Analysis of Water Grid Systems Using Threat ModelingJournal of Physics: Conference Series10.1088/1742-6596/2261/1/0120152261:1(012015)Online publication date: 1-Jun-2022
- Viswanathan GJ P(2021)A hybrid threat model for system-centric and attack-centric for effective security design in SDLCWeb Intelligence10.3233/WEB-210452(1-11)Online publication date: 7-Oct-2021
- Show More Cited By