Figure 4From: Risk-driven security testing using risk analysis with threat modeling approach Workflow diagram for state representation module. Back to article page