共 50 条
- [33] Threat Poker: Solving Security and Privacy Threats in Agile Software Development SECURE IT SYSTEMS, 2018, 11252 : 468 - 483
- [34] Models of Applied Privacy (MAP): A Persona Based Approach to Threat Modeling PROCEEDINGS OF THE 2023 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2023), 2023,
- [35] The Odyssey: modeling privacy threats in a brave new world 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 87 - 94
- [36] Towards Privacy Policy Conceptual Modeling CONCEPTUAL MODELING, ER 2020, 2020, 12400 : 429 - 438
- [37] Contextual Privacy Policy Modeling in IoT 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 94 - 102
- [38] Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2019, 2021, 11739 : 175 - 186
- [39] Towards Formal Modeling of Privacy Policies of Enterprises PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
- [40] Internet of Things : A Study on Security and Privacy Threats 2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 93 - 97