In the situation of a fancy procedure, attack trees can be built for each part instead of for The full technique. Directors can build attack trees and use them to inform security selections, to find out whether the programs are susceptible to an attack, and to evaluate a selected kind https://ieeexplore.ieee.org/document/9941250