Return to Article Details An Integration of Threat Modeling with Attack Pattern and Misuse Case for Effective Security Requirement Elicitation Download Download PDF