<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Generation from User Stories Using Large Language Models</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Guntur Budi Herwanto</string-name>
          <email>gunturbudi@ugm.ac.id</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Visual Modeling, Data Flow Diagrams, Software Development, Large Language Models</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Condori-Fernández</institution>
          ,
          <addr-line>O. Dieste, R. Guizzardi, K. M. Habibullah, A. Perini, A. Susi, S. Abualhaija, C. Arora, D. Dell'Anna, A</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science and Electronics</institution>
          ,
          <addr-line>Universitas Gadjah Mada</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Faculty of Computer Science, University of Vienna</institution>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Ferrari</institution>
          ,
          <addr-line>S. Ghanavati, F. Dalpiaz, J. Steghöfer, A. Rachmann, J. Gulden, A. Müller, M. Beck, D. Birkmeier, A. Herrmann</addr-line>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>In: D. Mendez</institution>
          ,
          <addr-line>A. Moreira, J. Horkof, T. Weyer, M. Daneva, M. Unterkalmsteiner, S. Bühne, J. Hehn, B. Penzenstadler, N</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>Visual modeling, particularly Data Flow Diagrams (DFDs), plays an essential role in modern software development, aiding in the design, understanding, and communication of system structures and potential security and privacy threats. Despite their importance, the manual creation of visual models is timeconsuming highlighting the need for automation in the generation of DFDs from user requirements. Automating the generation of DFDs presents a significant challenge, especially in accurately interpreting user requirements and abstracting them into correct and complete diagram elements. The complexity of this task is compounded by the need for semantic accuracy and the ability to facilitate visual editing for human intervention. This study explores the use of Large Language Models (LLMs) to automate DFD generation, utilizing GPT-3.5, GPT-4, Llama2, and Mixtral models. This study emphasizes human oversight and employs an open-source diagramming tool to ensure that diagrams are accurate, complete, and editable. The findings reveal GPT-4's superior capability in generating complete DFDs, with significant progress from open-source models like Mixtral, indicating a viable path toward automated visual modeling. This approach advances scalable automation in creating visual software models, with broader implications for automating other diagram types.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Visual modeling is an essential part of modern software development. It facilitates the design
and understanding of systems while improving communication and documentation [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. One
application of visual modeling is identifying potential security [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ] and privacy threats [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]
in software systems. One of the prominent diagrams for this case is the Data Flow Diagram
(DFD). DFD illustrates data movement within processes, stakeholders, and the data store. DFDs
also provide an understanding of system operations at multiple levels of granularity. They have
proven efective in characterizing the system in privacy threat analysis [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In addition, the
standard syntax of DFD has been extended [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and adapted to explicitly model security [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and
privacy concerns [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        However, manually creating visual models such as DFD is a time-consuming process[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ],
which can be a challenge when conducting threat modeling[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. To address this issue, attempts
have been made to automate creating DFDs from user requirements[8]. However, accurately
interpreting and abstracting user requirements into DFD elements remains challenging using
standard NLP approaches such as POS tagging and dependency tree [9]. The emergence of Large
Language Models (LLMs) provides new opportunities to address the challenges of understanding
semantic nuances.
      </p>
      <p>Novel LLMs have garnered increased interest within the software engineering domain,
particularly in the automation of model creation[10]. Although LLMs have demonstrated potential
in converting Unified Modeling Language (UML) diagrams into code-based diagrams like
PlantUML[10], concerns persist regarding the semantic accuracy of the generated models[10].
Furthermore, code-based diagrams present limitations regarding accessibility for visual
editing. This feature is particularly important for individuals without coding experience or when
communicating complex models to clients.</p>
      <p>This study explores the potential of Large Language Models (LLMs) in assisting software
development teams with diagram generation, focusing on the creation of Data Flow Diagrams
(DFDs) by leveraging the capabilities of widely used LLMs, including GPT-3.5 and GPT-4,
alongside two of the most proficient open-source models currently available, Mixtral-8x7B
and Llama2. The objective is to produce diagrams that are not only accurate and complete
but also editable using the open-source diagramming tool1. Recognizing the limitations of
semantic validity in previous studies[10], the importance of human oversight in the process is
emphasized. This research addresses several questions related to the efectiveness of LLMs in
producing usable diagrams for software development teams. Through empirical investigation,
the completeness and correctness of the DFDs generated by these models are assessed. Specifically,
this study aims to answer the following questions:
RQ1 How do the Large Language Models (GPT-3.5, GPT-4, Mixtral-8x7B, and Llama 2) compare
in terms of generating syntactically correct Data Flow Diagrams (DFDs)?
RQ2 How well do the DFDs generated by these Large Language Models represent the system’s
functionalities when compared to each other?</p>
      <p>To address these research questions, the paper first outlines the syntactic rules specific to
DFDs in Section 2. The proposed methodology is introduced in Section 3. The experiments
conducted and the findings are described in Section 4. The threats to the validity of the approach
are discussed in Section 5. Finally, the study concludes and summarizes the insights in Section
6.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Data Flow Diagram</title>
      <p>Data Flow Diagrams (DFD) illustrate the movement of data between external entities, processes,
and data stores within a system and serve as a tool to reveal relationships between system
components and express functional requirements for complex systems [11]. The syntax and
semantics rules that govern component connections and data transformations are fundamental
to DFD correctness and ensure consistency across diagrams through specific guidelines [ 12].
These rules include:
1. External Entity: Each external entity must have at least one input or output data flow
that facilitates interaction with the system.
2. Process: Each process within the DFD must have at least one input and/or output dataflow
to ensure that processes are not isolated. Output flows typically have diferent names
than input flows to distinguish the types of information being handled clearly.
3. Data flow direction: Data flows should move in one direction only, preventing cyclic or
backward flows that might make the diagram dificult to interpret.
4. Connection to Process: Each data flow must connect to at least one process, providing a
clear path for data movement within the system and ensuring that data does not exist in
isolation.
5. Data Store Movement: Data cannot move directly from one data store to another; it must
be processed by a process, emphasizing the role of processes in data transformation and
movement.</p>
      <p>There are also diferent levels of DFD; the higher the level, the more detail there is. In addition
to syntactic rules, semantic rules ensure consistency between levels by requiring that the names
of external entities and the data flow between processes and external entities remain the same
across levels. [12]. In this study, the focus is solely on level one of the DFD.</p>
    </sec>
    <sec id="sec-4">
      <title>3. Proposed Approach</title>
      <p>This section presents the proposed approach of how to use large language models (LLMs) to
transform a set of user stories into a DFD. Figure 1 summarizes the workflow of the proposed
approach.</p>
      <p>The process begins when a development team defines a user story set. Since the DFD
is intended to represent the data flow clearly, overcrowding it with too many elements or
connections can lead to confusion and reduce its readability. Therefore, an optional grouping
of functionalities is recommended. The diagram shows an example from the ALFRED project,
taken from the user story dataset [13]. It is a virtual assistant that helps elderly people to stay
active. The stories can be grouped into several functional groups, such as health and safety
features, communication and social interaction, etc. Each functional group, identified by its
thematic or functional similarity among user stories, is represented by a distinct Data Flow
Diagram (DFD).</p>
      <p>These groups of user stories can then be used as input to a prompt as shown in Figure 2. The
prompt is divided into four main parts: Task Description, Detailed Instruction, User Stories
Input, and Few-Shot Prompt. This structure is designed to sequentially guide the LLM through
the process of understanding the task, the method of execution, the input to be transformed,
and the format in which the output should be structured.</p>
      <p>The task description introduces the objective for the LLM, focusing on the correct
representation of DFD elements without delving into the specific syntax rules of DFDs. Adding detailed
instructions aims to enhance the LLM’s ability to abstract concepts and ensure compliance
with syntax requirements. Abstracting information efectively is vital to prevent the LLM from
treating user stories as separate entities. The LLM must identify similarities among processes,
actors, and data stores, capturing the essential flow of information accurately. The Few-Shot
Prompt section introduces a CSV template that outlines the mandatory sequence the LLM must
follow, aligning with the predefined syntax for use in draw.io. It is argued that generating the
specific syntax without any initial template (zero-shot generation) is impractical in this context,
considering the specific syntax required by the custom draw.io CSV import.</p>
      <p>The output generated in response to this prompt includes the requested CSV format and
additional textual information. Due to the format of this output, users are advised to interact
through a chat interface under human oversight.</p>
      <p>Finally, the Draw.io CSV import feature is utilized by first defining the style of the DFD
elements and connections to create a standardized DFD representation. One advantage of using
draw.io for diagrams, as opposed to code-based diagrams [10], is its editable nature. This allows
for human visual input, which can be beneficial when communicating with customers.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Preliminary Evaluation</title>
      <p>This preliminary evaluation aims to address the research question through empirical analysis.
To ensure a thorough investigation, a variety of projects from an open dataset of user stories[13]
were utilized. Following this, the LLMs and the evaluation metrics used to assess their output
are detailed. Evaluators were then presented with DFDs generated by these models and asked
to evaluate them. Lastly, the findings of the evaluation are outlined and discussed.</p>
      <sec id="sec-5-1">
        <title>4.1. Experiment Setup</title>
        <p>The study involved experimenting with four Large Language Models (LLMs). Among these, two
were provided by OpenAI: GPT-3.5 Turbo and GPT-4 Turbo, accessible through the ChatGPT
interface2. The other two open-source models, Llama2-70B3 by Meta AI and Mixtral-8x7B4 by
Mistral AI, were accessed via the Together.AI5 chat playground.</p>
        <p>For the empirical analysis, three software engineering instructors with experience teaching
DFDs participated. They evaluated the DFDs generated by each method based on completeness
and correctness on a scale from 1 to 5, where 5 represented the highest score. The LLMs used are
pseudonymized to eliminate any bias resulting from the instructor’s familiarity with the LLM’s
capabilities. Prior to the evaluation, a meeting was held to standardize the scoring methodology
among the three evaluators and the author.</p>
        <p>The evaluation criteria are as follows:
• Completeness: This metric assessed whether the DFD included all essential elements
(processes, data stores, external entities, and data flows) for a comprehensive system
description. Each component must be connected to at least one other component to avoid
isolated elements.
• Correctness: This involved verifying that the DFD accurately reflected the system’s
requirements, including logical data flow and consistent representation of external entities
2https://chat.openai.com
3https://huggingface.co/meta-llama/Llama-2-70b-chat-hf
4https://huggingface.co/mistralai/Mixtral-8x7B-Instruct-v0.1
5https://api.together.xyz
and data stores following the system’s external interactions. The goal was to ensure that
the DFD faithfully represented the semantic content of the user stories.</p>
        <p>From the open dataset[13], 17 projects were chosen, each featuring a variety of user stories.
To keep the complexity of the DFDs at a manageable level for evaluation, five representative
user stories from each project were selected. These stories were chosen to illustrate the system’s
primary functions and demonstrate the efectiveness of LLMs in delineating data flows among
various stakeholders, with a specific focus on stories involving multiple stakeholders.</p>
        <p>Five out of the 17 projects were assessed collectively by the three evaluators to maintain
a manageable workload for the evaluators. The evaluators then individually assessed three
projects, while the author evaluated the remaining three. The projects selected for collective
evaluation included Alfred, CamperPlus, Recycling, NSF, and Datahub. To assess the
completeness and correctness of the generated DFDs, a 1-to-5 Likert scale was used, enabling evaluators
to quantify their judgments regarding the completeness and correctness of each DFD.</p>
        <p>Generating DFDs began with manually entering the user stories into a chat interface, following
a specific prompt described in Figure 2. The responses containing the desired CSV format were
then integrated into predefined Draw.io CSV templates and uploaded to Draw.io for editing. The
platform’s auto-layout feature was used to organize the diagram elements, eliminating the need
for manual adjustments. All materials produced, including CSV files, Draw.io configurations,
and final DFD images, were documented and made available in a dedicated public repository 6.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Performance Results</title>
        <p>The DFD example produced by this approach is presented in Appendix A. Table 1 displays the
median completeness and correctness scores for each LLM method from the five collectively
selected projects. Among these, GPT-4 is highlighted as the most accurate in generating DFDs,
with the highest scores in completeness and correctness. This underscores GPT-4’s superior
capability in interpreting and converting user stories into DFDs. Mixtral, an open-source model,
demonstrates commendable performance by producing useful DFDs with a respectable degree
of accuracy and completeness. It outperforms closed-source models like GPT-3.5, which display
moderate to lower efectiveness. Llama2 received the lowest scores, especially in correctness,
suggesting that it faces challenges in understanding the semantics of the user stories. These
results can also answer the two research questions:</p>
        <p>Answer to RQ1: GPT-4 outperformed other LLM for generating syntactically
correct DFDs, scoring a median of 4.0 on a 1 to 5 Likert scale.</p>
        <p>Answer to RQ2: GPT-4 outperformed other LLM for accurately representing system
functionalities in DFDs, scoring a median of 4.0 on a 1 to 5 Likert scale.</p>
        <p>Note that there are no special syntax rules in the prompt. This demonstrates the LLM’s
internal knowledge of standard DFD conventions. Even if it is not a perfect score in terms of
completeness and correctness, including human involvement in the further processing of the
6https://github.com/gunturbudi/drawio_llm
DFD could improve the applicability of the generated DFDs. In addition, the chat modality of
these models ofers the potential for iterative refinement of DFDs. Future studies could explore
how iterative prompting could guide LLMs in adapting and improving DFDs. The threshold
between what humans would accept the prompt and later edit in editable diagramming tools
opens up an interesting empirical observation.</p>
      </sec>
      <sec id="sec-5-3">
        <title>4.3. Discussion</title>
        <p>Completeness scores are typically higher than correctness scores for all models, indicating that
while LLMs can accurately identify necessary elements of DFDs with the correct syntax, they
struggle to grasp the underlying semantics or logical connections between processes. This
ifnding is consistent with previous research [ 10] and highlights the importance of a collaborative
approach between humans and AI in the early stages of system design, particularly in diagram
modeling. Nevertheless, the ability of LLMs to understand the syntax of DFD without explicitly
mentioning the syntax and convention is a potential way to adapt to other open and widely
used models, such as Business Process Model and Notation (BPMN) and UML.</p>
        <p>The evaluator also found that data flow in the DFD tends to move exclusively to the left in
horizontal and downward in vertical orientations, as shown in Appendix A. This observation
suggests that data typically flows from external entities to processes and from processes to data
stores, but rarely in the opposite direction. This limitation is likely due to the examples used
in the prompts, which demonstrated data flow in only one direction, highlighting the critical
impact that the choice of examples in few-shot prompts can have on the model’s performance.</p>
        <p>This research employed a single prompt, which hinders the LLM potential of prompt
engineering. For example, explicitly specifying the desired criteria for the DFD within the prompt
might have been more advantageous than relying on the inherent knowledge of the LLM.
Additionally, exploring the possibility of incorporating various aspects of DFD into a few-shot
prompt represents another viable strategy. Despite LLM’s understanding of the DFD syntax,
it’s critical to refine the few-shot examples to ensure they can accurately represent all potential
directions of data flow.</p>
        <p>
          Finally, it’s important to recognize the inherent risks and limitations of relying solely on
AI-generated models, such as the potential for confusing them with reality, losing information,
or applying models that are inappropriate or incomplete [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Threats to Validity</title>
      <p>This study faces threats to validity from two major fronts: the subjective nature of evaluating
Data Flow Diagrams (DFDs) generated by Large Language Models (LLMs) and the selection
process of user stories. Subjective evaluations may not accurately capture the constructs of
completeness and correctness due to evaluators’ variability, oversight of diagram details, and
biases, challenging the construct validity of the findings. Concurrently, the potential bias
introduced by selecting a limited, possibly simpler set of user stories poses a risk to the external
validity of this study. This selection might skew the results towards more favorable outcomes by
not fully representing the complexity and diversity necessary for a comprehensive assessment
of LLM performance in generating DFDs.</p>
      <p>To mitigate the first threat, a meeting is conducted between the author and three raters, and
a clear expectation of what the Likert scale should mean for scoring is set. As for the second
threat, the author set selection criteria for user stories and ensured that only these criteria
were followed. However, there is still much scope to improve the validity of future research.
Developing a structured assessment framework with clear, objective criteria for evaluating
charts and automated comparison methods with predefined ”gold standard” charts would be
beneficial. These approaches aim to standardize the assessment process and reduce subjectivity
to provide a more objective and reliable measure of the completeness and correctness of the
diagrams. In addition, training evaluators and incorporating multiple perspectives into the
evaluation process can further align judgments and capture a broader range of insights into the
quality of the diagrams.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Conclusion and Future Work</title>
      <p>Visual modeling has long been a key tool for uncovering the complexity of software requirements.
Recent advances in large language models (LLMs) ofer promising ways to augment human
eforts in this domain. This study investigated the capacity of LLMs for generating Data Flow
Diagrams (DFDs) within software development processes. The preliminary empirical evaluation
focused on assessing the completeness and correctness of DFDs produced by GPT-3.5, GPT-4,
Llama2, and Mixtral-8x7B. The results show the leading performance of GPT-4 in achieving
a particularly high score in the generation of syntactically correct DFD and the accurate
representation of system functionalities in DFD. In addition, the eficacy of the Mixtral-8x7B
model emphasizes the value of open-source models in broadening access to AI technologies in
software engineering.</p>
      <p>This research identified a common drawback of LLMs which is failing to accurately capture
the semantics of the user requirements [10]. This highlights the imperative for human oversight
in AI-assisted design processes. By synergizing the capabilities of LLMs with human expertise,
there is potential to initiate diagrammatic representations of software systems efectively.
Developing interactive tools that incorporate user input could significantly improve the fidelity of
diagrams and promote a more collaborative design methodology. Consequently, a concentrated
efort to refine LLMs’ understanding of system semantics is essential. Such improvements would
enable these models to more accurately encapsulate the technical nuances and domain-specific
details that are essential for complete and accurate visual representations.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>The author thanks the anonymous reviewers for their valuable feedback on this paper.
Appreciation is extended to Gerald Quirchmayr, Annisa Maulida Ningtyas, Diyah Utami Kusumaning
Putri, and Dinar Nugroho Pratomo for their insightful evaluation and contributions to the
paper. Furthermore, the author acknowledges the financial support received from the Indonesia
Endowment Fund for Education (IEFE/LPDP), Ministry of Finance, Republic of Indonesia, and
the assistance provided by the University of Vienna, Faculty of Computer Science.
modeling, in: 2020 IEEE European Symposium on Security and Privacy Workshops
(EuroS&amp;PW), IEEE, 2020, pp. 302–309.
[8] G. B. Herwanto, G. Quirchmayr, A. M. Tjoa, From user stories to data flow diagrams
for privacy awareness: A research preview, in: International Working Conference on
Requirements Engineering: Foundation for Software Quality, Springer, 2022, pp. 148–155.
[9] G. B. Herwanto, G. Quirchmayr, A. M. Tjoa, Leveraging nlp techniques for privacy
requirements engineering in user stories, IEEE Access 12 (2024) 22167–22189. doi:10.
1109/ACCESS.2024.3364533.
[10] J. Cámara, J. Troya, L. Burgueño, A. Vallecillo, On the assessment of generative ai in
modeling tasks: an experience report with chatgpt and uml, Software and Systems
Modeling (2023) 1–13.
[11] E. Yourdon, L. L. Constantine, Structured design. fundamentals of a discipline of computer
program and systems design, Englewood Clifs: Yourdon Press (1979).
[12] R. Ibrahim, et al., Formalization of the data flow diagram rules for consistency check,
arXiv preprint arXiv:1011.0278 (2010).
[13] F. Dalpiaz, Requirements data sets (user stories), Mendeley Data, V1 (2018).</p>
    </sec>
    <sec id="sec-9">
      <title>A. Sample DFD Output</title>
      <p>(a) DFD generated from GPT-4
(b) DFD generated from GPT-3.5</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>J.</given-names>
            <surname>Ludewig</surname>
          </string-name>
          ,
          <article-title>Models in software engineering-an introduction</article-title>
          ,
          <source>Software and Systems Modeling</source>
          <volume>2</volume>
          (
          <year>2003</year>
          )
          <fpage>5</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Caserta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Zendra</surname>
          </string-name>
          ,
          <article-title>Visualization of the static aspects of software: A survey</article-title>
          ,
          <source>IEEE Transactions on Visualization and Computer Graphics</source>
          <volume>17</volume>
          (
          <year>2010</year>
          )
          <fpage>913</fpage>
          -
          <lpage>933</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Berger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sohr</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Koschke</surname>
          </string-name>
          ,
          <article-title>Automatically extracting threats from extended data flow diagrams</article-title>
          ,
          <source>in: Engineering Secure Software and Systems: 8th International Symposium, ESSoS</source>
          <year>2016</year>
          , London, UK, April 6-
          <issue>8</issue>
          ,
          <year>2016</year>
          . Proceedings 8, Springer,
          <year>2016</year>
          , pp.
          <fpage>56</fpage>
          -
          <lpage>71</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>L.</given-names>
            <surname>Sion</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yskout</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. Van</given-names>
            <surname>Landuyt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Joosen</surname>
          </string-name>
          ,
          <article-title>Solution-aware data flow diagrams for security threat modeling</article-title>
          ,
          <source>in: Proceedings of the 33rd Annual ACM Symposium on Applied Computing</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1425</fpage>
          -
          <lpage>1432</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Deng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wuyts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Scandariato</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Preneel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Joosen</surname>
          </string-name>
          ,
          <article-title>A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements</article-title>
          ,
          <source>Requirements Engineering</source>
          <volume>16</volume>
          (
          <year>2011</year>
          )
          <fpage>3</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Alshareef</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Stucki</surname>
          </string-name>
          , G. Schneider,
          <article-title>Transforming data flow diagrams for privacy compliance</article-title>
          .,
          <source>MODELSWARD</source>
          <volume>21</volume>
          (
          <year>2021</year>
          )
          <fpage>207</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K.</given-names>
            <surname>Wuyts</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Sion</surname>
          </string-name>
          , W. Joosen,
          <article-title>Linddun go: A lightweight approach to privacy threat (c) DFD generated from Llama2 (d) DFD generated from Mixtral Figure 3: DFDs Generated from Large Language Models</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>