diff --git a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
index cd2a145ca2c603996ff21ef0e10824b333035224..b8dd6820a7900f0d0053b8186b1c86124d405687 100644
--- a/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
+++ b/models/Application_examples/Supply_Chain_with_Two_Cyber_Threats.mp
@@ -57,7 +57,10 @@ Palmieri, Margaret. "Assessing and Visualizing Risk in
 Monterey Phoenix Through a Supply Chain Cyber-Attack Use 
 Case." NPS Master's Thesis, Monterey, CA: September 2021.
 
-Search terms: 
+Search terms: behavior, supply chain; coordination, event; 
+cyber threat; cyber-attack; event attribute, number; table; 
+trace annotation; risk score; risk analysis; SAY statement; 
+MARK command; report, global
 
 Instructions: