Attack Tree, Attack path
- Bookmarks
Attack Trees, Dr. Dobb's Journal December 1999, Modeling security threats By Bruce Schneier
http://www.schneier.com/paper-attacktrees-ddj-ft.html
Larry Osterman's WebLog, Threat Modeling, Part 2 - threats
http://blogs.msdn.com/larryosterman/archive/2005/01/17/354588.aspx
A Practical Approach to Threat Modeling, Tom Olzak, March 2006
http://adventuresinsecurity.com/blog/wp-content/uploads/2006/03/A_Practical_Approach_to_Threat_Modeling.pdf
Attack Trees, Robert J. Ellison, Software Engineering Institute [vita], Copyright © 2005 Carnegie Mellon University, 2006-03-16
https://buildsecurityin.us-cert.gov/daisy/bsi/articles/best-practices/requirements/236.html
UMLsec
http://www4.in.tum.de/~umlsec/
SecureUML
- Tools
PTA
http://www.ptatechnologies.com/
UML diagrams