Combining Architectural Analyses based on Attacker Models