Review Article

Threat Analysis and Risk Assessment for Connected Vehicles: A Survey

Figure 10

Threat modeling of FOTA with OWASP Threat Dragon.