Fig. 8From: Automating threat modeling using an ontology frameworkGrouping of data flowsBack to article page