2023
DOI: 10.1016/j.cose.2022.103047
|View full text |Cite
|
Sign up to set email alerts
|

Threat modeling framework for mobile communication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…Lack of authentication H [17][18][19][20][21] Data privacy attacks H [17,[22][23][24] Lack of access control H [25][26][27][28] Identity-based attacks H [18,[29][30][31] Note: H is high risk.…”
Section: Risk Index Authormentioning
confidence: 99%
See 1 more Smart Citation
“…Lack of authentication H [17][18][19][20][21] Data privacy attacks H [17,[22][23][24] Lack of access control H [25][26][27][28] Identity-based attacks H [18,[29][30][31] Note: H is high risk.…”
Section: Risk Index Authormentioning
confidence: 99%
“…In summary, as wireless communication technologies evolve, we must remain vigilant and proactively address the security challenges they present. Through comprehensive research, collaboration, and innovation, we can better ensure the safety and reliability of future communication technologies [46].…”
Section: Sign Statementioning
confidence: 99%
“…By addressing software security risks, organizations can reduce the likelihood and impact of security breaches and safeguard their software assets. Some of the key aspects considered in software security include threat modeling [99]- [102], secure design and development [103], authentication and authorization [104], data protection [105], regular updates and patching [106], secure configuration and deployment, secure testing, incident response and recovery, user education and awareness, compliance and regulations.…”
Section: Ensuring Availability and Reliabilitymentioning
confidence: 99%
“…Additionally, Threat modeling facilitates informed decision-making for management and technical teams. It aids in resource optimization by directing efforts towards addressing the most critical and high-impact vulnerabilities [8] [9]. Moreover, Threat modeling fosters a security-aware culture within organizations, encouraging a mindset that considers security implications throughout the entire development process.…”
Section: Introductionmentioning
confidence: 99%