Fig. 3From: Automating threat modeling using an ontology frameworkStandardization of operating system namesBack to article page