Threat Modeling — How to Visualize Attacks on IOTA?

Ikram Ullah*, Gerard de Roode, Nirvana Meratnia, Paul Havinga

*Corresponding author for this work

Research output: Contribution to journalArticleAcademicpeer-review

6 Downloads (Pure)

Fingerprint

Dive into the research topics of 'Threat Modeling — How to Visualize Attacks on IOTA?'. Together they form a unique fingerprint.

Physics & Astronomy

Medicine & Life Sciences

Chemical Compounds

Engineering & Materials Science