1. Microsoft threat modeling tool (2018). https://docs.microsoft.com/it-it/azure/security/develop/threat-modeling-tool
2. Abela, R.: Statistics show why WordPress is a popular hacker target (2020)
3. Ansari, M.T., Pandey, D., Alenezi, M.: STORE: security threat oriented requirements engineering methodology (2019)
4. Arsac, W., Bella, G., Chantry, X., Compagna, L.: Multi-attacker protocol validation. J. Autom. Reason. 46(3–4), 353–388 (2011)
5. Bhattacharya, D.: OWASP threat dragon review (2020)