top of page
Blockchain Network Cybersecurity
Design Secure IoT/IT Product
All potential threats need t be identified and rated.
Methods: attack tree, STRIDE model, etc.
Outcome of this analysis are requirements.
Requirements shall provide high level functions.
-
Polymer degradation
-
Polymer aging prediction
-
Polymer durability
-
Polymer life prediction
-
Polymer performance degradation
-
Polymer material aging
-
Polymer part life cycle
-
Polymer component degradation
-
Polymer part aging
-
Polymer part life prediction
bottom of page