O'Reilly logo
  • Michael Weiss thinks this is interesting:

Stride Threat Model: spoofing, tampering, repudiation, nonrepudiation, denial of service, and elevation of privilege.

From

Cover of Research Methods for Cyber Security

Note

Also include information disclosure (for the I in STRIDE).
Combine repudiation and repudiation into the R for STRIDE.