To really make it more difficult for adversaries to obtain user qualifications, supplemental credentials need to have for use. This action exhibits the dependencies among the attack groups and minimal-level element attributes. After that, the CVSS technique is used and scores are calculated to the components in the tree. To https://ieeexplore.ieee.org/document/9941250