While some capabilities of your proposed enterpriseLang are analyzed, there remain issues. A lot more recognised attacks may very well be accustomed to even further validate the language. Moreover, larger company units may be modeled to check its usability. The twelve danger-modeling procedures summarized During this write-up originate from a https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network