Threat Modeling — How to Visualize Attacks on IOTA?

Ikram Ullah*, Gerard de Roode, Nirvana Meratnia, Paul Havinga

*Corresponding author for this work

Research output: Contribution to journalArticleAcademicpeer-review

15 Citations (Scopus)
75 Downloads (Pure)

Fingerprint

Dive into the research topics of 'Threat Modeling — How to Visualize Attacks on IOTA?'. Together they form a unique fingerprint.

Computer Science