Combining Misuse Cases with Attack Trees and Security Activity Models | IEEE Conference Publication | IEEE Xplore