“…The aim of a paper can be test automation, test coverage, or assessing a specific quality attribute, such as security. Kuk and Kim (2008), Marchetto et al (2008), Marchetto and Tonella (2009), Song and Miao (2009), Ran et al (2009), Andrews et al (2010), Song et al (2011), Tkachuk and Rajan (2011), Törsel (2011), Chen et al (2012), Tanida et al (2013), Bansal and Sabharwal (2013), Törsel (2013), Arora and Sinha (2013), Törsel (2013), Suhag and Bhatia (2014), Nabuco and Paiva (2014), Polpong and Kansomkeat (2015), Zhang and Tanno (2015), Dixit et al (2015), Habibi and Mirian-Hosseinabadi (2015), Sengupta and Dasgupta (2015), Qi et al (2017), Boukhris et al (2017) and Gao et al (2022) DFM or data flow graph, DDM or data dependency graph, CFM or CDM or graph Tarhini et al (2008), Ran et al (2009), Offutt and Wu (2010), Tung et al (2010), Törsel (2011, Bansal and Sabharwal (2013), Panthi and Mohapatra (2017), Akpinar et al (2020) and Elgendy et al (2020a) Security-related models: threat model, attack model, safe model, secure model, and vulnerability model Mallouli et al (2008), Xu et al (2012),…”