Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/ieeesp/StevensVRAM19
%A Stevens, Rock
%A Votipka, Daniel
%A Redmiles, Elissa M.
%A Ahern, Colin
%A Mazurek, Michelle L.
%D 2019
%J IEEE Secur. Priv.
%K dblp
%N 4
%P 35-42
%T Applied Digital Threat Modeling: It Works.
%U http://dblp.uni-trier.de/db/journals/ieeesp/ieeesp17.html#StevensVRAM19
%V 17
@article{journals/ieeesp/StevensVRAM19,
added-at = {2023-08-28T00:00:00.000+0200},
author = {Stevens, Rock and Votipka, Daniel and Redmiles, Elissa M. and Ahern, Colin and Mazurek, Michelle L.},
biburl = {https://www.bibsonomy.org/bibtex/25ec5be2f5194c65c88a4079846dafb48/dblp},
ee = {https://www.wikidata.org/entity/Q114986971},
interhash = {e97a3e02e24dea3e47004fd7f37946ed},
intrahash = {5ec5be2f5194c65c88a4079846dafb48},
journal = {IEEE Secur. Priv.},
keywords = {dblp},
number = 4,
pages = {35-42},
timestamp = {2024-04-09T01:44:02.000+0200},
title = {Applied Digital Threat Modeling: It Works.},
url = {http://dblp.uni-trier.de/db/journals/ieeesp/ieeesp17.html#StevensVRAM19},
volume = 17,
year = 2019
}