Denial of services: the attacker exhausts the assets desired to offer companies to genuine end users. Next weaponization may be the shipping and delivery stage — when cybercriminals make an effort to infiltrate their target’s community or protection technique. Attack trees are diagrams that depict attacks over a system in https://ieeexplore.ieee.org/document/9941250