Application allows give a framework for handling the process of menace modeling and the data it provides. It can also assist with risk and vulnerability evaluation and propose remediation. On the other hand, these steps is probably not enough to circumvent Attackers from achieving transmittedDataManipulation since basically blocking the Original https://ieeexplore.ieee.org/document/9941250