Figure 15From: Risk-driven security testing using risk analysis with threat modeling approach Comparison of risk values. Back to article page