Analysis and comparison of some threat assessment methods | IEEE Conference Publication | IEEE Xplore