{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T21:07:28Z","timestamp":1764364048116},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/isias.2010.5604049","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T14:59:49Z","timestamp":1287500389000},"page":"149-154","source":"Crossref","is-referenced-by-count":20,"title":["Threat modeling approaches and tools for securing architectural designs of an e-banking application"],"prefix":"10.1109","author":[{"given":"Caroline","family":"Mockel","sequence":"first","affiliation":[]},{"given":"Ali E.","family":"Abdallah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.119"},{"article-title":"Online Banking Verfahren","year":"0","author":"borchert","key":"ref11"},{"journal-title":"Barclays","article-title":"About the PINsentry card reader","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03549-4_11","article-title":"Optimised to Fail: Card Readers for Online Banking","author":"drimer","year":"2009","journal-title":"Proceed Financial Cryptography and Data Security'09 Barbados"},{"journal-title":"RedTeam Pentesting GmbH","article-title":"Man-in-the-Middle Attacks against the chipTAN comfort Online Banking System","year":"0","key":"ref14"},{"journal-title":"Microsoft ACE Team Website","year":"0","key":"ref15"},{"article-title":"Attack Trees","year":"0","author":"schneier","key":"ref16"},{"journal-title":"UK Payments Administration","article-title":"Financial Fraud Action UK announces latest Fraud Figures","year":"0","key":"ref17"},{"year":"0","key":"ref4","article-title":"Microsoft SDL: Return on Investment"},{"journal-title":"Threat Modeling","year":"2004","author":"swiderski","key":"ref3"},{"journal-title":"Writing secure code practical strategies and proven techniques for building secure applications in a networked world","year":"2002","author":"howard","key":"ref6"},{"key":"ref5","article-title":"Experiences Threat Modeling at Microsoft","author":"shostack","year":"2008","journal-title":"Modeling Security Workshop Toulouse"},{"article-title":"Threat Modeling Series 2007","year":"0","author":"shostack","key":"ref8"},{"key":"ref7","article-title":"Uncover Security Design Flaws Using The STRIDE Approach","author":"hernan","year":"2006","journal-title":"MSDN Magazine"},{"journal-title":"Open Web Application Security Project (Owasp)","article-title":"Threat Risk Modeling","year":"0","key":"ref2"},{"key":"ref1","first-page":"9","author":"stallings","year":"2006","journal-title":"Cryptography and Network Security Principles and Practice"},{"journal-title":"Windows Vista One Year Vulnerability Report","year":"0","key":"ref9"}],"event":{"name":"2010 Sixth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2010,8,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2010,8,25]]}},"container-title":["2010 Sixth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5594714\/5604038\/05604049.pdf?arnumber=5604049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T11:15:40Z","timestamp":1497870940000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5604049\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isias.2010.5604049","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}