Fig. 10From: Automating threat modeling using an ontology frameworkImplementation activity diagramBack to article page