Fig. 7From: Automating threat modeling using an ontology frameworkGrouping of software namesBack to article page