Academic literature on the topic 'Threat modelling'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat modelling.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threat modelling"
Meland, Per Håkon, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, and Paolo Giorgini. "Threat Analysis in Goal-Oriented Security Requirements Modelling." International Journal of Secure Software Engineering 5, no. 2 (2014): 1–19. http://dx.doi.org/10.4018/ijsse.2014040101.
Full textPaskauskas, R. Andrew. "Decoding 5G security: toward a hybrid threat ontology." Open Research Europe 4 (March 6, 2025): 34. https://doi.org/10.12688/openreseurope.16916.2.
Full textNovokhrestov, A., A. Konev, A. Shelupanov, and A. Buymov. "Computer network threat modelling." Journal of Physics: Conference Series 1488 (March 2020): 012002. http://dx.doi.org/10.1088/1742-6596/1488/1/012002.
Full textBrazhuk, A. I., and E. V. Olizarovich. "Ontological analysis in the problems of container applications threat modelling." Informatics 20, no. 4 (2023): 69–86. http://dx.doi.org/10.37661/1816-0301-2023-20-4-69-86.
Full textKulović, Jasmina, Sabina Baraković, and Jasmina Baraković Husić. "Analysis of Threats for Web of Things (WoT) System." B&H Electrical Engineering 14, no. 2 (2020): 19–27. http://dx.doi.org/10.2478/bhee-2020-0009.
Full textSuhas, Kelkar Siddhi. "Evaluation of Threat Models." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 809–13. http://dx.doi.org/10.22214/ijraset.2023.49311.
Full textKelkar, Siddhi Suhas. "Evaluation of Threat Models." International Journal of Innovative Science and Research Technology 8, no. 2 (2023): 1948–52. https://doi.org/10.5281/zenodo.7723042.
Full textMahendra V, Manjunatha G S, Dr. Nagaraja G S, and Dr. Shushrutha K S. "Network Threat Detection and Modelling." International Journal of Emerging Science and Engineering 12, no. 12 (2024): 16–19. http://dx.doi.org/10.35940/ijese.h9629.12121124.
Full textPotter, Bruce. "Microsoft SDL Threat Modelling Tool." Network Security 2009, no. 1 (2009): 15–18. http://dx.doi.org/10.1016/s1353-4858(09)70008-x.
Full textMahendra, V. "Network Threat Detection and Modelling." International Journal of Emerging Science and Engineering (IJESE) 12, no. 12 (2024): 16–19. https://doi.org/10.35940/ijese.H9629.12121124.
Full textDissertations / Theses on the topic "Threat modelling"
Svensson, Carl. "Threat modelling of historical attacks with CySeMoL." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170476.
Full textGeng, Ningyao. "azureLang: Cyber Threat Modelling in Microsoft Azure cloud computing environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284501.
Full textSingh, Virdi Amandeep. "AWSLang: Probabilistic Threat Modelling of the Amazon Web Services environment." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254329.
Full textSkobalj, Nedo. "Validating vehicleLang for Domain-specific Threat Modelling of In-vehicle Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249601.
Full textJefford-Baker, Jonathan. "ALCOL : Probabilistic Threat Modelling of the Amazon Elastic Container Service Domain." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261421.
Full textSyed, Romilla. "DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3906.
Full textFagade, Tesleem. "A multi-domain approach for security compliance, insider threat modelling and risk management." Thesis, University of Bristol, 2018. http://hdl.handle.net/1983/c7461605-6493-4413-8835-65847df90a57.
Full textGreenwood, David. "Socio-technical analysis of system-of-systems using responsibility modelling." Thesis, University of St Andrews, 2012. http://hdl.handle.net/10023/3176.
Full textvan, der Schoot Willem. "Validating vehicleLang, a domain-specific threat modelling language, from an attacker and industry perspective." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284244.
Full textGodakanda, Menaka L. "Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2023. https://ro.ecu.edu.au/theses/2653.
Full textBooks on the topic "Threat modelling"
Tseloni, Andromachi. Modelling threats in England and Wales. University of Manchester, 1994.
Find full textAntonio, Moretti, ed. Volcanoes: Formation, eruptions, and modelling. Nova Science Publishers, 2009.
Find full textM, Kim Y., Shang H. M, and United States. National Aeronautics and Space Administration., eds. Turbulence modelling of flow fields in thrust chambers: Final technical report for the period June 10, 1991 through September 13, 1992. Research Institute, the University of Alabama in Huntsville, 1993.
Find full textM, Kim Y., Shang H. M, and United States. National Aeronautics and Space Administration., eds. Turbulence modelling of flow fields in thrust chambers: Final technical report for the period June 10, 1991 through September 13, 1992. Research Institute, the University of Alabama in Huntsville, 1993.
Find full textApollonio, Fabrizio I. Architettura in 3D: Modelli digitali per i sistemi cognitivi. B. Mondadori, 2012.
Find full textMagnenat-Thalmann, Nadia. Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH 2009, Zermatt, Switzerland, November 29 – December 2, 2009. Proceedings. Springer-Verlag Berlin Heidelberg, 2009.
Find full textPaolini, Priscilla. Metodi e tecniche integrate di rilevamento per la realizzazione di modelli virtuali dell'architettura della città. Gangemi, 2007.
Find full textInternational Conference on Recent Advances in 3-D Digital Imaging and Modeling (1997 Ottawa, Ont.). International Conference on Recent Advances in 3-D Digital Imaging and Modeling: Proceedings, May 12-15, 1997, Ottawa, Ontario, Canada. IEEE Computer Society Press, 1997.
Find full textJaworski, Barbara, Josef Rebenda, Reinhard Hochmuth, et al. Inquiry in University Mathematics Teaching and Learning. Masaryk University Press, 2021. http://dx.doi.org/10.5817/cz.muni.m210-9983-2021.
Full textBook chapters on the topic "Threat modelling"
Baker, Matthew. "Threat Modelling." In Secure Web Application Development. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8596-1_3.
Full textSeaman, Jim. "Cyber Threat Prediction and Modelling." In Artificial Intelligence and National Security. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06709-9_7.
Full textBaudains, Peter, and Alan Wilson. "Conflict Modelling: Spatial Interaction as Threat." In Global Dynamics. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118937464.ch8.
Full textDong, Xun, John A. Clark, and Jeremy L. Jacob. "Threat Modelling in User Performed Authentication." In Information and Communications Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88625-9_4.
Full textLeClair, Beckett, and Kaniz Fatema. "Threat Modelling in Virtual Assistant Hub Devices." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-74443-3_37.
Full textMarchione, Elio, and Alan Wilson. "Spatial Interaction as Threat: Modelling Maritime Piracy." In Global Dynamics. John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118937464.ch11.
Full textvan Do, Thoai, Van Thuan Do, Niels Jacot, Bernardo Flores, Boning Feng, and Thanh van Do. "MITRE ATT and CK Threat Modelling Extensions for Mobile Threats." In Mobile Web and Intelligent Information Systems. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-39764-6_17.
Full textAlbers, Wulf. "Two-Person Bargaining Between Threat and Fair Solution." In Modelling and Analysis in Arms Control. Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-82943-7_17.
Full textFielder, Andrew. "Modelling the Impact of Threat Intelligence on Advanced Persistent Threat Using Games." In From Lambda Calculus to Cybersecurity Through Program Analysis. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41103-9_8.
Full textNaik, Nitin, Paul Jenkins, Paul Grace, Dishita Naik, Shaligram Prajapat, and Jingping Song. "An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-74443-3_15.
Full textConference papers on the topic "Threat modelling"
Goudarzi, Mohammad, Arash Shaghaghi, Simon Finn, Burkhard Stillerd, and Sanjay Jha. "Towards Threat Modelling of IoT Context-Sharing Platforms." In 2024 22nd International Symposium on Network Computing and Applications (NCA). IEEE, 2024. https://doi.org/10.1109/nca61908.2024.00025.
Full textWeir, J., B. Shaw, K. Pizzolato-Heine, et al. "Fragment Characterisation & Threat Modelling - A Multinational Study to Re-Define & Represent the Fragment Threat." In Personal Armour Systems Symposium. Royal Military Academy (Belgium), 2025. https://doi.org/10.52202/078352-0054.
Full textChianese, Luca, Daniele Granata, Paolo Palmiero, and Massimiliano Rak. "Leveraging Threat Modelling for Effective Penetration Testing in 5G Systems." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679437.
Full textSharma, Desh Deepak, and Atul Sarojwal. "Secure and Resilient Threat Modelling Strategy for Drone Delivery System." In 2024 IEEE Region 10 Symposium (TENSYMP). IEEE, 2024. http://dx.doi.org/10.1109/tensymp61132.2024.10752205.
Full textP, Jonathan Paul, and Manoranjitham R. "Predictive Modelling for Network Threat Detection using Artificial Intelligence Techniques." In 2025 5th International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 2025. https://doi.org/10.1109/icpcsn65854.2025.11035811.
Full textBaeté, Christophe, and Dr Olga Dolgikh. "Optimizing Pipeline AC Threat Assessments Using Computational Aided Engineering (CAE) Modelling." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19219.
Full textSunder, Giulio, Alberto Salvatore Colletto, Sara Raimondi, Cataldo Basile, Alessio Viticchié, and Alessandro Aliberti. "Enhancing OT Threat Modelling: An Effective Rule-Based Approach for Attack Graph Generation." In 2024 4th Intelligent Cybersecurity Conference (ICSC). IEEE, 2024. https://doi.org/10.1109/icsc63108.2024.10895716.
Full textSouthey, R. D., and F. P. Dawalibi. "Computer Modelling of AC Interference Problems for the Most Cost-Effective Solutions." In CORROSION 1998. NACE International, 1998. https://doi.org/10.5006/c1998-98564.
Full textLeal, Armando Borjas, and Stephen F. Biagiotti. "Evolving Excavation Damage Modelling Predictions to a Data-Driven Approach." In CONFERENCE 2023. AMPP, 2023. https://doi.org/10.5006/c2023-19558.
Full textHaynes, Gerald J., Christophe Baeté, Tyson Manning, and Lance Barton. "Variances in Pipeline Ac Interference Computational Modeling." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-12985.
Full textReports on the topic "Threat modelling"
Faverjon, Céline, Angus Cameron, and Marco De Nardi. Modelling framework to quantify the risk of AMR exposure via food products - example of chicken and lettuce. Food Standards Agency, 2022. http://dx.doi.org/10.46756/sci.fsa.qum110.
Full textBeers, Gregory W. Seadyn90 Modelling: Three Point Mooring of FLIP with Three Arrays. Defense Technical Information Center, 1991. http://dx.doi.org/10.21236/ada247729.
Full textOrtiz, Michael. Three-Dimensional Modelling and Simulation of Ballistic Impact. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada393714.
Full textJoshi, G., G. S. Dangol, B. Bajracharya, M. S. R. Murthy, and S. Wesselman. A Manual on Participatory Three-Dimensional Modelling (P3DM). International Centre for Integrated Mountain Development (ICIMOD), 2016. http://dx.doi.org/10.53055/icimod.616.
Full textJoshi, G., G. S. Dangol, B. Bajracharya, M. S. R. Murthy, and S. Wesselman. A Manual on Participatory Three-Dimensional Modelling (P3DM). International Centre for Integrated Mountain Development (ICIMOD), 2016. http://dx.doi.org/10.53055/icimod.616.
Full textAttansio, Orazio, and Debbie Blair. Structural modelling in policymaking. Centre for Excellence and Development Impact and Learning (CEDIL), 2018. http://dx.doi.org/10.51744/cip9.
Full textBroome, J. G3d: a three dimensional gravity modelling program for IBM-compatible microcomputers. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1991. http://dx.doi.org/10.4095/132672.
Full textEaton, D. BMOD3D: a program for three-dimensional seismic modelling using the Born approximation. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1997. http://dx.doi.org/10.4095/208674.
Full textAnsari, S. M., E. M. Schetselaar, and J. A. Craven. Three-dimensional magnetotelluric modelling of the Lalor volcanogenic massive-sulfide deposit, Manitoba. Natural Resources Canada/CMSS/Information Management, 2022. http://dx.doi.org/10.4095/328003.
Full textCarter, T. R., F. R. Brunton, J. K. Clark, et al. Three-dimensional geological modelling of the Paleozoic bedrock of southern Ontario: status update. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2020. http://dx.doi.org/10.4095/321080.
Full text