Our activities vary from manufacturing specific details that organizations can set into practice quickly to more time-phrase investigate that anticipates advances in systems and long term difficulties. When controlling cybersecurity possibility, organizations typically have interaction in danger modeling, risk evaluation and attack modeling. Risk modeling deals with the possibility https://ieeexplore.ieee.org/document/9941250