Fig. 6From: Automating threat modeling using an ontology frameworkClassification of vulnerabilitiesBack to article page