Fig. 5From: Automating threat modeling using an ontology frameworkClassification of applicationsBack to article page