{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:30:06Z","timestamp":1725741006329},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","funder":[{"name":"National Science Foundation","award":["1564293"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3507315","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"1341-1346","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A user-centric threat model and repository for cyber attacks"],"prefix":"10.1145","author":[{"given":"Prerit","family":"Datta","sequence":"first","affiliation":[{"name":"Texas Tech University"}]},{"given":"Sara","family":"Sartoli","sequence":"additional","affiliation":[{"name":"Texas Tech University"}]},{"given":"Luis Felipe","family":"Gutierrez","sequence":"additional","affiliation":[{"name":"Texas Tech University"}]},{"given":"Faranak","family":"Abri","sequence":"additional","affiliation":[{"name":"Texas Tech University"}]},{"given":"Akbar Siami","family":"Namin","sequence":"additional","affiliation":[{"name":"Texas Tech University"}]},{"given":"Keith S.","family":"Jones","sequence":"additional","affiliation":[{"name":"Texas Tech University"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"volume-title":"The security development lifecycle","author":"Lipner Howard","key":"e_1_3_2_1_1_1","unstructured":"Howard and Lipner . 2006. The security development lifecycle . Redmond : Microsoft Press . Howard and Lipner. 2006. The security development lifecycle. Redmond: Microsoft Press."},{"key":"e_1_3_2_1_2_1","unstructured":"M. Howard and S. Lipner. 2006. The Security Development Lifecycle. Microsoft Press. M. Howard and S. Lipner. 2006. The Security Development Lifecycle. Microsoft Press."},{"volume-title":"Proceedings of the 8th Australian Information Security Management Conference.","year":"2010","key":"e_1_3_2_1_3_1","unstructured":"Johnstone. 2010 . Threat modeling with Stride and UML . In Proceedings of the 8th Australian Information Security Management Conference. Johnstone. 2010. Threat modeling with Stride and UML. In Proceedings of the 8th Australian Information Security Management Conference."},{"key":"e_1_3_2_1_4_1","unstructured":"OWASP. 2018. Application Threat Modeling. https:\/\/www.owasp.org\/index.php\/Application_Threat_Modeling OWASP. 2018. Application Threat Modeling. https:\/\/www.owasp.org\/index.php\/Application_Threat_Modeling"},{"volume-title":"Proceedings of the 27th Annual ACM Symposium on Applied Computing.","year":"2012","author":"Borozdin Schaad","key":"e_1_3_2_1_5_1","unstructured":"Schaad and Borozdin . 2012 . TAM 2: automated threat analysis . In Proceedings of the 27th Annual ACM Symposium on Applied Computing. Schaad and Borozdin. 2012. TAM 2: automated threat analysis. In Proceedings of the 27th Annual ACM Symposium on Applied Computing."},{"key":"e_1_3_2_1_6_1","volume-title":"Threat Modeling: Designing for Security","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack . 2014 . Threat Modeling: Designing for Security ( 1 st ed.). Wiley Publishing . Adam Shostack. 2014. Threat Modeling: Designing for Security (1st ed.). Wiley Publishing.","edition":"1"}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3507315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T10:48:34Z","timestamp":1682419714000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":6,"alternative-id":["10.1145\/3477314.3507315","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3507315","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}