Reference networking scenarios — Threats, design
techniques and control issues. BSI Standards
Publication.
ISO/IEC. (2013). 27002:2013 - Information technology —
Security techniques — Code of practice for informati
on security controls. Switzerland.
ISO/IEC. (2017). 27001:2017 Information technology -
Security techniques - Information security management
systems - Requirements (ISO/IEC 27001:2013).
ISO/IEC. (2018). 29100:2011+A1:2018 Information
technology — Security techniques — Privacy
framework. British Standards Publication.
ISO/IEC. (2019). 27701:2019 Security techniques —
Extension to ISO/IEC 27001 and ISO/IEC 27002 for
privacy information management — Requirements and
guidelines.
ISO. (2016). 27799-27002:2016 Health informatics —
Information security management in health using,
27002.
Jump, M., & Finnegan, A. (2017). Using Standards to
Establish Foundational Security Requirements for
Medical Devices. Biomedical Instrumentation and
Technology, 51(s6), 33–38. https://doi.org/10.2345/
0899-8205-51.s6.33
Marr, B. (2018). Why The Internet Of Medical Things
(IoMT) Will Start To Transform Healthcare In
2018. Retrieved September 9, 2019, from
https://www.forbes.com/sites/bernardmarr/2018/01/25
/why-the-internet-of-medical-things-iomt-will-start-to-
transform-healthcare-in-2018/#7cbe068b4a3c
McManus, J. (2018). Security by Design: Teaching Secure
Software Design and Development Techniques. J.
Comput. Sci. Coll., 33(3), 75–82. Retrieved from
http://dl.acm.org/citation.cfm?id=3144687.3144710
Meier, J. D., Mackman, A., Vasireddy, S., Dunner, M.,
Escamilla, R., & Murukan, A. (2003). Improving Web
Application Security : Threats and Countermeasures.
Retrieved from https://www.microsoft.com/en-
us/download/confirmation.aspx?id=1330
Microsoft. (2020). Microsoft Threat Modeling Tool - Azure
| Microsoft Docs. Retrieved February 6, 2020, from
https://docs.microsoft.com/en-
us/azure/security/develop/threat-modeling-tool
Myagmar, S., Lee, A. J., & Yurick, W. (2005). Threat
Modeling as a Basis for Security Requirements Suvda.
In In Symposium on requirements engineering for
information security (SREIS) (pp. 1–8).
NIST. (2012). Special Publication 800-30 Guide for
Conducting Risk Assessments. Retrieved from
http://scholar.google.com/scholar?hl=en&btnG=Searc
h&q=intitle:NIST+Special+Publication+800-30#0
NIST. (2014). 800-53 Revision 4 Security and Privacy
Controls for Federal Information Systems and
Organizations Security and Privacy Controls for
Federal Information Systems and Organizations. Joint
Task Force Transformation Initiative. U.S. Department
of Commerce. https://doi.org/10.6028/NIST.SP.800-
53Ar4
Osterman, L. (2007). Threat Modeling, once again – Larry
Osterman’s WebLog. Retrieved November 18, 2019,
from https://blogs.msdn.microsoft.com/larryosterman/
2007/08/30/threat-modeling-once-again/
OWASP. (2019). OWASP Top Ten. https://doi.org/
10.1007/s11623-006-0164-8
OWASP. (2020). OWASP Threat Dragon. Retrieved
March 3, 2020, from https://owasp.org/www-project-
threat-dragon/#
Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E.,
Solanas, A., & Patsakis, C. (2018). Security and
Privacy Analysis of Mobile Health Applications: The
Alarming State of Practice. IEEE Access, 3536(c), 1–
13. https://doi.org/10.1109/ACCESS.2018.2799522
Parker, L., Karliychuk, T., Gillies, D., Mintzes, B., Raven,
M., & Grundy, Q. (2017). A health app developer’s
guide to law and policy: A multi-sector policy analysis.
BMC Medical Informatics and Decision Making, 17(1),
1–13. https://doi.org/10.1186/s12911-017-0535-0
Pfitzmann, A., & Hansen, M. (2010). A terminology for
talking about privacy by data minimization:
Anonymity, Unlinkability, Undetectability,
Unobservability, Pseudonymity, and Identity
Management (Version 0.34 Aug. 10, 2010). Technical
University Dresden. tech. rep. TU Dresden and ULD
Kie. https://doi.org/10.1.1.154.635
Ponemon Institute. (2018). The State of Cybersecurity in
Healthcare Organizations in 2018.
Scandariato, R., Wuyts, K., & Joosen, W. (2015). A
descriptive study of Microsoft’s threat modeling
technique. Requirements Engineering, 20(2), 163–180.
https://doi.org/10.1007/s00766-013-0195-2
Seeam, A., Ogbeh, O. S., Guness, S., & Bellekens, X.
(2019). Threat Modeling and Security Issues for the
Internet of Things. In 2nd International Conference on
Next Generation Computing Applications 2019,
NextComp 2019 - Proceedings (pp. 1–8).
https://doi.org/10.1109/NEXTCOMP.2019.8883642
Shevchenko, N., Frye, B. R., & Woody, C. (2018). Threat
Modeling for Cyber-Physical System-of-Systems:
Methods Evaluation. Retrieved from https://resources.
sei.cmu.edu/library/asset-view.cfm?assetid=526365
Shostack, A. (2008). Experiences threat modeling at
Microsoft. CEUR Workshop Proceedings, 413, 1–11.
Shostack, A. (2014). Threat Modeling: Designing for
Security. John Wiley & Sons.
Sion, L., Van Landuyt, D., Yskout, K., & Joosen, W.
(2018). SPARTA: Security & Privacy Architecture
Through Risk-Driven Threat Assessment. Proceedings
- 2018 IEEE 15th International Conference on Software
Architecture Companion, ICSA-C 2018, 89–92.
https://doi.org/10.1109/ICSA-C.2018.00032
Sion, L., Wuyts, K., Yskout, K., Van Landuyt, D., &
Joosen, W. (2018). Interaction-Based Privacy Threat
Elicitation. Proceedings - 3rd IEEE European
Symposium on Security and Privacy Workshops, EURO
S and PW 2018, 79–86. https://doi.org/10.1109/
EuroSPW.2018.00017
Sion, L., Yskout, K., Van Landuyt, D., & Joosen, W.
(2018). Solution-aware data flow diagrams for security
threat modeling. In Proceedings of the ACM
Symposium on Applied Computing (pp. 1425–1432).