In the situation of a fancy method, attack trees may be developed for each element in lieu of for the whole process. Administrators can Construct attack trees and use them to inform protection conclusions, to determine whether the methods are liable to an attack, and To guage a certain variety https://ieeexplore.ieee.org/document/9941250