In the case of a posh method, attack trees may be constructed for each ingredient as opposed to for The entire technique. Directors can Construct attack trees and make use of them to inform security conclusions, to find out whether or not the systems are at risk of an attack, https://ieeexplore.ieee.org/document/9941250