Figure 6From: Risk-driven security testing using risk analysis with threat modeling approach Workflow diagram for risk analysis. Back to article page