A Raghuvanshi, UK Singh, T Kassanuk… - ECS …, 2022 - iopscience.iop.org
… requires an understanding of the threats, vulnerabilities, and attacks involved (2) (3). The
threat of … by the threat of vulnerability is called an attack. Attacks include submitting a malicious …