Hence for a quick information, we shall below examine how to generate an obstruction towards the mission with the cyber attackers. This is because adversaries may possibly use various approaches determined by elements which include their techniques sets, targets’ method configuration aned availability of acceptable resources. (two) The “data” for https://ieeexplore.ieee.org/document/9941250