selected publications chapter Automatically Extracting Threats from Extended Data Flow Diagrams. Lecture Notes in Computer Science. 56-71. 2016