1.
Vijaya Kumar Gaddam S, Samunnisa, Sreedevi P. Cybersecurity Threat Modeling for Machine Learning Systems: An Asset-centric Approach with Trust Boundaries and Ownership Roles. JoHTDCPCV [Internet]. 2025 Dec. 25 [cited 2026 May 21];2(3):27-32. Available from: https://matjournals.net/engineering/index.php/JoHTDCPCV/article/view/2912