Figure 7From: Risk-driven security testing using risk analysis with threat modeling approach Workflow diagram for test case selection and execution. Back to article page