go to ORKG: http://orkg.org/orkg/predicate/P69012
threat model
process by which potential threats, such as structural vulnerabilities can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of view