Personensuche
X
?
Proceedings of the 22nd Workshop on Privacy in the Electronic Society ,
4
From Privacy Policies to Privacy Threats: A Case Study in P..:
, In:
?
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing ,
5
Mitigation lost in translation : leveraging threat infor..:
, In:
?
Proceedings of the 36th Annual ACM Symposium on Applied Computing ,
6
Land of the lost: privacy patterns' forgotten properties ..:
, In:
?
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
7
LINDDUN GO: A Lightweight Approach to Privacy Threat Modeli..:
, In:
?
Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: New Ideas and Emerging Results ,
8
Threat modeling : from infancy to maturity:
, In:
?
Trust, Privacy and Security in Digital Business; Lecture Notes in Computer Science ,
9
A Data Utility-Driven Benchmark for De-identification Metho..:
, In:
?
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing ,
10
A comparison of system description models for data protecti..:
, In:
?
Proceedings of the 33rd Annual ACM Symposium on Applied Computing ,
11
Effective and efficient privacy threat modeling through dom..:
, In:
?
Privacy Technologies and Policy; Lecture Notes in Computer Science ,
12