Uneingeschränkter Zugang

Modeling Scenarios Combining Cyber Intelligence Procedures, Methods, Technologies and Techniques


Zitieren

Popov P., Smilenova D., Vasileva V., Architectural Approach Usage in the Public Sector and Personal Data Protection, In: Proceedings of the 9th ICAICTSEE – 2019, Sofia, Bulgaria, pp. 125-135, ISSN 2367-7635 Search in Google Scholar

Microsoft, 2022. Microsoft Threat Modeling Tool. [Online] Available on: https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats. Search in Google Scholar

Sparx Systems, 2007. Using UML part one – Structural Modeling Diagrams. [Online] Available at: www.sparxsystems.com Sparx Systems, 2007. Search in Google Scholar

Sparx Systems, 2007. Using UML part two – Behavioral Modeling Diagrams. [Online] Available at: www.sparxsystems.com Search in Google Scholar

MITRE ATT&CK, Available on: https://attack.mitre.org/techniques/T1590 Search in Google Scholar