Abstract | ||
---|---|---|
•Existing threat analysis techniques lack in quality assurance of outcomes.•The use of validation by illustration is predominant.•The tools presented in the primary studies lack maturity and are not always available.•There is a lack of Definition of Done in the threat analysis procedures. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1016/j.jss.2018.06.073 | Journal of Systems and Software |
Keywords | Field | DocType |
Threat analysis (modeling),Risk assessment,Security-by-design,Software systems,Systematic literature review (SLR) | Systematic review,Systems engineering,Computer science,Agile software development,Risk analysis (engineering),Software system,DevOps,Software,Cornerstone,Quality assurance,Secure by design | Journal |
Volume | ISSN | Citations |
144 | 0164-1212 | 6 |
PageRank | References | Authors |
0.58 | 45 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Katja Tuma | 1 | 10 | 2.34 |
Gul Calikli | 2 | 61 | 9.41 |
Riccardo Scandariato | 3 | 492 | 36.85 |