One thing to bear in mind: the nearer to the start in the chain it is possible to end an attack, the much less pricey and time-consuming the cleanup will probably be. This get the job done aims to produce a menace modeling language for evaluating the cyber stability of https://ieeexplore.ieee.org/document/9941250