Figure 5From: Risk-driven security testing using risk analysis with threat modeling approach Workflow diagram for threat modelling. Back to article page