References
- [1] S. Baraković, et al.: Quality of Life Framework for Personalised Ageing: A Systematic Review of ICT Solutions, Electronics, 17, 2940, 202010.3390/ijerph17082940721599232344521
- [2] A.L. Bleda, et al.: AmiCare: Ambient Intelligent and Assistive System for Caregivers Support, 16th International Conference on Embedded and Ubiquitous Computing, 201810.1109/EUC.2018.00017
- [3] J. Kulović, S. Baraković, J. Baraković Husić: Analysis of Threats for Web of Things (WoT) System, Bosanskohercegovačka elektrotehnika, 14:19-26, 202010.2478/bhee-2020-0009
- [4] A. Hajrić, T. Smaka, S. Baraković, J. Baraković Husić: Methods, Methodologies, and Tools for Threat Modeling with Case Study, Telfor Journal, 12(1): 56-61, 202010.5937/telfor2001056H
- [5] J.D. Meier, A. Mackman, B. Wastell: Threat Modeling Web Applications, Microsoft Corporation, 2005, Available at: https://docs.microsoft.com/en-us/previous-versions/msp-n-p/ff648006(v=pandp.10)?redirectedfrom=MSDN.
- [6] A. Shostack: Threat Modeling: Designing for Security, John Wiley & Sons, Inc., 2014
- [7] T. Agarwal: Wireless Sensor Network Architecture and Its Applications, ELPROCUS, 2016, Available at: https://www.elprocus.com/architecture-of-wireless-sensor-network-and-applications/.
- [8] L. Banjanović-Mehmedović: Bežične senzorske mreže, University in Tuzla, 2009
- [9] M. Angel, E. Villegas, S. Y. Tang, Y. Qian: Wireless Sensor Network Communication Architecture for Wide-Area Large Scale Soil Moisture Estimation and Wetlands Monitoring, WALSAIP Research Project, Technical Report TR-NCIG-0501
- [10] B. Radenković, et al.: Internet inteligentnih uređaja, University of Belgrade, 2017
- [11] Silicon Laboratories: The Evolution of Wireless Sensor Networks, Report, 2013
- [12] S. Baraković, et al.: Security Issues in Wireless Networks: An Overview, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775732
- [13] J. Fruhlinger: Threat Modeling Explained: A Process for Anticipating Cyber Attacks, 2020. Available at: https://www.csoonline.com/article/3537370/threat-modeling-explained-a-process-for-anticipating-cyber-attacks.html.
- [14] Centar informacijske sigurnosti (CIS): Modeliranje sigurnosnih prijetnji (Threat modeling), 2012, Available at: https://www.cis.hr/files/dokumenti/CIS-DOC-2012-05-049.pdf.
- [15] Microsoft Corporation: Threat Modeling: Microsoft Threat Modeling Tool, Available at: https://www.microsoft.com/en-us/securityengineering/sdl/threat-modeling.
- [16] T. Dervišević, S. Baraković, J. Baraković Husić: Case Study: Security of System for Remote Management of Windows, Bosanskohercegovačka elektrotehnika, 14: 4-11, 202010.2478/bhee-2020-0007
- [17] H. Mahmood: Application Threat Modeling using DREAD and STRIDE, Infosec Blog, 2017, Available at: https://haiderm.com/application-threat-modeling-using-dread-and-stride/.
- [18] N. Shevchenko: Threat Modeling: 12 Available Methods, 2018. Available at: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/.
- [19] M. Abomhara, G.M. Goein, M. Gerdes: A STRIDE-Based Threat Model for Telehealth Systems, Norsk Informasjonssikkerhetskonferanse (NISK), 2015