Fig. 1From: A security event description of intelligent applications in edge-cloud environmentCORAS modeling analysis of threat scenariosBack to article page