To exhibit enterpriseLang, two enterprise procedure models of identified authentic-globe cyber attacks are demonstrated utilizing an attack graph excerpted in the generic attack graph of enterpriseLang, which demonstrates the attack methods and defenses for that appropriate system model belongings, and how These are linked. Generally, these actors deploy malware into https://ieeexplore.ieee.org/document/9941250