Feasible defenses to interrupt this attack, which may be carried out to enhance the security standard of the program, are indicated by eco-friendly circles. Moreover, the width in the lines concerning the attack techniques and defenses suggests the chance in the attack route. In this article, the strains are of https://ieeexplore.ieee.org/document/9941250