과제정보
이 연구는 LIG NEX1 산학협력과제 지원으로 연구되었음.
참고문헌
- R. Stevens, D. Votipka, E. M. Redmiles, C. Ahern, P. Sweeney, and M. L. Mazurek, "The battle for new york: a case study of applied digital threat modeling at the enterprise level," in 27th USENIX Security Symposium (USENIX Security18),pp. 621-637, Aug. 2018.
- D. Granata and M. Rak, "Systematic analysis of automated threat modelling techniques: Comparison of open-source tools," Software Quality Journal, vol. 32, pp. 125-161, May. 2023.
- Microsoft, "Microsoft Threat Modeling Tool, "https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool, Jan. 2024.
- OWASP, "PyTM," https://owasp.org/www-project-pytm, Jan. 2024.
- E. Bygdas, L. A. Jaatun, S. B. Antonsen, A. Ringen and E. Eiring, "Evaluating Threat Modeling Tools: Microsoft TMT versus OWASP Threat Dragon," 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, pp. 1-7, 2021.
- Z. Shi, K. Graffi, D. Starobinski and N. Matyunin, "Threat Modeling Tools: A Taxonomy," in IEEE Security & Privacy, vol. 20, no. 4, pp. 29-39, July-Aug. 2022.
- L. Sion, S. Verreydt, K. Yskoutt, "Threat modeling in Dutch organizations," Twentieth Symposium on Usable Privacy and Security (SOUPS 2024), pp. 473-486, Aug. 2024.
- Bernsmed, Karin & Cruzes, Daniela & Jaatun, Martin & lovan, Monica, "Adopting threat modelling in agile software development projects," Journal of Systems and Software, vol. 183, no. 111090, Jan. 2022.
- A. Hussain and M. Kutar, "Usability Metric Framework for Mobile Phone Application," The 10th Annual Post Graduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, pp. 22-23, Jun. 2009.
- International Organization for Standardization, "Ergonomics of human-system interaction Part 11: Usability: Definitions and concepts," ISO 9241-11:2018, Mar. 2018.
- L. Sion, D. Van Landuyt, K. Yskout and W. Joosen, "SPARTA: Security & Privacy Architecture Through Risk-Driven Threat Assessment," 2018 IEEE International Conference on Software Architecture Companion (ICSA-C), pp. 89-92, Apr. 2018.
- Ashwini Siddhi, Mathew Coles, Dell Technologies. "Threat Modeling at Scale," SAFECode, Jun. 2023.
- J. Von Der Assen, M. F. Franco, C. Killer, E. J. Scheid and B. Stiller, "CoReTM: An Approach Enabling Cross-Functional Collaborative Threat Modeling," 2022 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 189-196, Jul. 2022.
- Madan, Ankita, and Sanjay Kumar Dubey, "Usability evaluation methods: a literature review," International Journal of Engineering Science and Technology, vol. 4, no. 2, pp. 590-599, Feb. 2012.
- Basili, V., Caldeira, G., and Rombach, H.D., "The Goal Question Metric Approach," Encyclopedia of Software Engineering, vol. 1, Jan. 1994.
- Hussain, Azham &Kutar, Maria. "Usability Evaluation of SatNav Application on Mobile Phone Using mGQM," International Journal of Computer Information Systems and Industrial Management Applications. vol. 4, pp. 9-9, Jan. 2012.
- Paul B. Bokingkito, Lomesindo T. Caparida, "Usability evaluation of areal-time water quality monitoring mobile application," Procedia Computer Science, Vol. 197, pp. 642-649, Jan. 2022.
- A. Ashraf, X. Zhu, J. Liu, Q. Rauf and R. Firdaus, "Usability Evaluation Framework of Smart Home Applications for Senior Citizens," 2022 12th International Conference on Software Technology and Engineering(ICSTE), pp. 29-39, Oct. 2022.