Attack-Defense Trees ; CWE weaknesses ; Security patterns ; Classification ; Data integration ; CAPEC attacks