Research Article

Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model

Figure 4

Attack tree for obtaining customer information.