Table A1 
List of vulnerability or attack method related to the threats

a0c0