Being familiar with the methods attackers choose is significant to establish a approach to prevent such attacks and mitigate pitfalls. Being familiar with the stages of the qualified attack lifecycle is the first step. Broad (Visible, agile, and easy threat) modeling is made of procedures and procedures that can be https://ieeexplore.ieee.org/document/9941250