. Iso/iec, Information technology -security techniquessystems security engineering -capability maturity model, 2008.

C. J. Alberts, A. J. Dorofee, J. Stevens, and C. Woody, Introduction to the octave approach, 2003.

R. Bayer and E. Mccreight, Organization and maintenance of large ordered indices, 1970.

K. Beckers, D. Hatebur, and M. Heisel, A problem-based threat analysis in compliance with common criteria, vol.09, p.2013

, Sdl threat modeling tool. security development lifecycle, 2018.

D. Dhillon, Developer-driven threat modeling: Lessons learned in the trenches, IEEE Security Privacy, vol.9, issue.4, pp.41-47, 2011.

M. Donner, Toward a security ontology, IEEE Security and Privacy, vol.1, issue.3, pp.6-7, 2003.

A. Ekelhart, S. Fenz, M. Klemen, and E. Weippl, Security ontology: Simulating threats to corporate assets, vol.12, pp.249-259, 2006.

I. Flechais and A. Sasse, Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-science, Int. Journal of Human-Computer Studies, vol.67, pp.281-296, 2009.

, The OWASP Foundation. Owasp attack list, 2017.

M. Fowler, UML Distilled: A Brief Guide to the Standard Object Modeling Language, Object Technology Series, 2003.

E. Frumento and C. Dambra, The role of intangible assets in the modern cyber threat landscape: the hermeneut project, vol.5, 2019.

D. Gritzalis, G. Iseppi, A. Mylonas, and V. Stavrou, Exiting the risk assessment maze: A meta-survey, ACM Comput. Surv, vol.51, issue.1, 2018.

M. Howard and S. Lipner, The Security Development Lifecycle, vol.34, 2006.

R. Kamatchi and K. Ambekar, Analyzing impacts of cloud computing threats in attack based classification models, 2016.

Y. Koen, H. Thomas, V. Dimitri, S. Laurens, W. Kim et al., Threat modeling: from infancy to maturity, New Ideas and Emerging Results, ICSE, 2020.

L. Kohnfelder and P. Garg, The threats to our products. Microsoft Interface, Microsoft Corporation, vol.33, 1999.

G. Mcgraw, Software Security: Building Security In, 2006.

D. Mellado, E. Fernández-medina, and M. Piattini, A common criteria based security requirements engineering process for the development of secure information systems, vol.29, 2007.

, Common attack pattern enumeration and classification, 2007.

, Attck matrix for enterprise, 2015.

N. M. Mohammed, M. Niazi, M. Alshayeb, and S. Mahmood, Exploring software security approaches in software development lifecycle: A systematic mapping study, Comp. Stand. & Int, vol.50, pp.107-115, 2017.

T. Rauter, A. Höller, J. Iber, and C. Kreiner, Asset-centric security risk assessment of software components, Workshop on MILS: Architecture and Assurance for Secure Systems, vol.01, p.2016

K. Rhee, D. Won, S. Jang, S. Chae, and S. Park, Threat modeling of a mobile device management system for secure smart work, Electronic Commerce Research, vol.13, 2013.

R. Scandariato, K. Wuyts, and W. Joosen, A descriptive study of microsoft's threat modeling technique, Requirements Engineering, p.20, 2013.

N. Shevchenko, T. Chick, P. O'riordan, T. P. Scanlon, and C. Woody, Threat modeling: a summary of available methods, 2018.

A. Shostack, Experiences threat modeling at microsoft, vol.01, 2008.

A. Shostack, Threat Modeling: Designing for Security, 2014.

G. Sindre and A. Opdahl, A reuse-based approach to determining security requirements, 2003.

W. Stallings and L. Brown, Computer Security: Principles and Practice, 2014.

J. Steven, Threat modeling -perhaps it's time, IEEE Security Privacy, vol.8, issue.3, pp.83-86, 2010.

A. Syalim, Y. Hori, and K. Sakurai, Comparison of risk analysis methods: Mehari, magerit, nist800-30 and microsoft's security management guide, Int. Conf. on Availability, Reliability and Security, 2009.

P. Torr, Demystifying the threat modeling process, IEEE Security Privacy, vol.3, issue.5, pp.66-70, 2005.

K. Tuma, G. Calikli, and R. Scandariato, Threat analysis of software systems: A systematic literature review, Journal of Systems and Software, vol.144, pp.275-294, 2018.

T. Ucedavelez, Real world threat modeling using the pasta methodology, 2012.

A. V. Uzunov and E. B. Fernandez, An extensible patternbased library and taxonomy of security threats for distributed systems, Computer Standards Interfaces, vol.36, issue.4, pp.734-747, 2014.

W. Xiong and L. Robert, Threat modeling -a systematic literature review, Computers Security, vol.84, pp.53-69, 2019.