With this stage, we manually extract the data essential for developing enterpriseLang with the ATT&CK Matrix. We contemplate Each individual adversary method as an attack action which might be carried out by adversaries to compromise system property. From the procedure description, we find out how this technique (attack step) is https://ieeexplore.ieee.org/document/9941250