Security patterns ; Classification ; CAPEC attacks ; CWE weaknesses ; Attack-Defense Trees