Now 539 visitors
Today:126 Yesterday:1153
Total: 2391 413S 88P 96R
2026-02-06, Week 6
Member Login
Welcome Message
Statistics
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration / Invoice
Paper Archives
Outstanding Papers
Program / Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20220353 Question.9
Questioner: shyoon17@korea.ac.kr    2022-02-16 ¿ÀÈÄ 3:31:14
IEEE/ICACT20220353 Answer.9
Answer by Auhor jongjcho@korea.ac.kr   2022-02-16 ¿ÀÈÄ 3:31:14
It's good to see the authors use STRIDE to model threats. I have some questions. First, I wonder why STRIDE was used among the many threat modeling methods. Second, need to manage risk through the relevant threat modeling, and I am curious about how you proceeded with that part. Third, assuming that risk management was performed, I am curious about how you managed the risk for each risk factor. Fourth, the author did threat modeling for webcam, and I want to know the actual case of the threat to webcam, and I wonder at least one example of how the results are mapped from S, T, R, I, D, and E, respectively. Fifth, I understand that modeling was conducted based on open-source, and I wonder what layer to focus on when creating DFD, how the focused layer distinguishes it from the non-concentrated layer at the low level of DFD and I wonder why the unfocused layer was judged that way.

Select Voice