Source growth: Entails attackers acquiring or stealing assets to rely on them for just a potential attack. This action displays the dependencies among the attack groups and reduced-stage ingredient attributes. After that, the CVSS approach is applied and scores are calculated with the parts from the tree. The technique model https://ieeexplore.ieee.org/document/9941250