Vijaya Kumar Gaddam, S., Samunnisa and Sreedevi, P. (2025) “Cybersecurity Threat Modeling for Machine Learning Systems: An Asset-centric Approach with Trust Boundaries and Ownership Roles”, Journal of Hacking Techniques, Digital Crime Prevention and Computer Virology, 2(3), pp. 27–32. Available at: https://matjournals.net/engineering/index.php/JoHTDCPCV/article/view/2912 (Accessed: 21 May 2026).