Conference on Availability, Reliability and Security,
page 38. ACM.
Jürjens, J. (2002). UMLsec: Extending UML for secure
systems development. In International Conference on
The Unified Modeling Language, pages 412-425.
Springer, Berlin, Heidelberg.
Kammüller, F. R., Nurse, J. W., and Probst, C. (2016).
Attack tree analysis for insider threats on the iot using
isabelle. International Conference on Human Aspects
of Information Security, Privacy, and Trust. Springer.
Kamongi, P., Gomathisankaran, M., and Kavi, K.M.
(2014). Nemesi: Automated Architecture for Threat
Modeling and Risk Assessment for Cloud Computing.
In Proceedings of the 6th ASE International
Conference on Privacy, Security, Risk and Trust
(PASSAT).
Katsikeas, S., Johnson, P., Hacks, S., and Lagerström, R.
(2019). Probabilistic Modeling and Simulation of
Vehicular Cyber Attacks: An Application of the Meta
Attack Language. In Proceedings of the 5th
International Conference on Information Systems
Security and Privacy (ICISSP).
Kazim, M. and Evans, D. (2016). Threat Modeling for
Services in Cloud. 2016 IEEE Symposium on Service-
Oriented System Engineering (SOSE), pages 66-72.
Lagerström, R., Johnson, P., and Ekstedt, M. (2010).
Architecture analysis of enterprise systems
modifiability: a metamodel for software change cost
estimation. Software quality journal, 18(4): 437-468.
Manzoor, S., Zhang, H., and Suri, N. (2018). Threat
Modeling and Analysis for the Cloud Ecosystem. 2018
IEEE International Conference on Cloud Engineering
(IC2E), pages 278-281.
Mjihil, O., Haqiq, A., and Huang, D. (2017). Improving
attack graph scalability for the cloud through SDN-
based decomposition and parallel processing.
International Symposium on Ubiquitous Networking.
Springer.
Nagaraju, S., and Parthiban, L. (2015). Analyzing
configurations of authentication access points in cloud
using attack graph. 2015 IEEE International
Conference on Computer Graphics, Vision and
Information Security (CGVIS), pages 72-76.
Ngenzi, A., Selvarani, R. and Suchithra. R. (2016). Threat
Modeling Based on Randomized Seeding Attacks in
Cloud Virtual Machines. IOSR Journal of Computer
Engineering (IOSR-JCE), 18(3): 53-60.
Ning, H., and Liu, H. (2012). Cyber-physical-social based
security architecture for future internet of things.
Advances in Internet of Things, 2(1): 1.
Sahay, R., Geethakumari, G., and Modugu, K. (2018).
Attack graph - Based vulnerability assessment of rank
property in RPL-6LOWPAN in IoT. 2018 IEEE 4th
World Forum on Internet of Things (WF-IoT), pages
308-313.
Schilling, A., and Werners, B. (2013). A quantitative
threat modeling approach to maximize the return on
security investment in cloud computing. Proceedings
of the 1st International Conference on Cloud Security
Management, pages 68-77.
Schneier, B. (1999). Attack trees. Dr. Dobb’s journal,
24(12): 21-29.
Sharma, A. (2017). Emerging Trends in Safety Issues in
Cloud - The Potentials of Threat Model. International
Journal on Future Revolution in Computer Science
and Communication Engineering, 3(10): 260-263.
Subasinghe, K. D. B. H., Kodithuwakku, S. R., and Perera,
H. S. C. (2014). A Risk Management Framework in
the Cloud using Big Data and Security Informatics-An
Application of Attack Tree for Analysis of Social
Media Networks. International Journal of Scientific
and Research Publications, 11(4): 1-5.
Suciu, G., Vulpe, A., Halunga, S., Fratu, O., Todoran, G.,
and Suciu, V. (2013). Smart cities built on resilient
cloud computing and secure internet of things. In 2013
19th international conference on control systems and
computer science, pages 513-518. IEEE.
Torkura, K. A., Sukmana, M. I. H., Meinig, M., Cheng, F.,
Meinel, C., and Graupner, H. (2018). A threat
modeling approach for cloud storage brokerage and
file sharing systems. NOMS IEEE/IFIP Network
Operations and Management Symposium. IEEE.
Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis,
D., Foteinos, V., Poulios, G., and Moessner, K.
(2013). Enabling smart cities through a cognitive
management framework for the internet of things.
IEEE communications magazine, 51(6): 102-111.
Wang, H., Chen, Z., Zhao, J., Di, X., and Liu, D. (2018).
A Vulnerability Assessment Method in Industrial
Internet of Things Based on Attack Graph and
Maximum Flow. IEEE Access, 6: 8599-8609.
Wang, P., Ali, A., and Kelly, W. (2015). Data security and
threat modeling for smart city infrastructure. Cyber
Security of Smart Cities, Industrial Control System
and Communications (SSIC). International Conference
on Cyber Security of Smart cities, Industrial Control
System and Communications (SSIC). IEEE.
Wen, L. (2014). Research on Multilayer Security Audit
Research Based on Attack Graph in Cloud Computing.
Applied Mechanics and Materials, 644: 3408-3411.
Xiong, W., Krantz, F., and Lagerström, R. (2019). Threat
modeling and attack simulations of connected
vehicles: a research outlook. In Proceedings of the 5th
International Conference on Information Systems
Security and Privacy (ICISSP).
Xiong, W. and Lagerström, R. (2019). Threat modeling –
a systematic literature review. Computers & Security,
84: 53-69.
Zimba, A., Chen, H., and Wang, Z. (2016). Attack tree
analysis of Man in the Cloud attacks on client device
synchronization in cloud computing. Computer and
Communications (ICCC), 2nd IEEE International
Conference on. IEEE.