It’s challenging to know exactly where to begin to handle all of them. It’s equally as challenging to know when to stop. Menace modeling can assist. After we complete attack simulations about the program model, the different attacks which the process is liable to may be identified and feasible mitigation https://ieeexplore.ieee.org/document/9941250