[1]
“Threat Modeling for a Secured Software Development”, IJARCS, vol. 7, no. 1, pp. 40–48, Jan. 2017, doi: 10.26483/ijarcs.v7i1.2615.