[1]
S. Vijaya Kumar Gaddam, Samunnisa, and P. Sreedevi, “Cybersecurity Threat Modeling for Machine Learning Systems: An Asset-centric Approach with Trust Boundaries and Ownership Roles”, JoHTDCPCV, vol. 2, no. 3, pp. 27–32, Dec. 2025.