Scaling Threat Modeling Beyond STRIDE and Data Flows