Research Article

An Efficient Identification of Security Threats in Requirement Engineering Methodology

Figure 2

ISTDRE activity diagram.