Figure 14From: Risk-driven security testing using risk analysis with threat modeling approach Comparison of FSM coverage for system models. Back to article page