Have a personal or library account? Click to login
Modeling Scenarios Combining Cyber Intelligence Procedures, Methods, Technologies and Techniques Cover

Modeling Scenarios Combining Cyber Intelligence Procedures, Methods, Technologies and Techniques

Open Access
|Jul 2024

References

  1. Popov P., Smilenova D., Vasileva V., Architectural Approach Usage in the Public Sector and Personal Data Protection, In: Proceedings of the 9th ICAICTSEE – 2019, Sofia, Bulgaria, pp. 125-135, ISSN 2367-7635
  2. Microsoft, 2022. Microsoft Threat Modeling Tool. [Online] Available on: https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-threats.
  3. Sparx Systems, 2007. Using UML part one – Structural Modeling Diagrams. [Online] Available at: www.sparxsystems.com Sparx Systems, 2007.
  4. Sparx Systems, 2007. Using UML part two – Behavioral Modeling Diagrams. [Online] Available at: www.sparxsystems.com
  5. MITRE ATT&CK, Available on: https://attack.mitre.org/techniques/T1590
Language: English
Page range: 14 - 17
Published on: Jul 4, 2024
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2024 Atanas Atanasov, Veselina Gagamova, Ivan Hristozov, Elitsa Pavlova, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.