Denial of assistance: the attacker exhausts the methods required to deliver companies to authentic buyers. This action demonstrates the dependencies between attack categories and low-amount part attributes. After that, the CVSS system is utilized and scores are calculated to the elements from the tree. To model software threats, Extensive diagrams https://ieeexplore.ieee.org/document/9941250