To demonstrate enterpriseLang, two business process models of acknowledged genuine-planet cyber attacks are shown making use of an attack graph excerpted in the generic attack graph of enterpriseLang, which exhibits the attack steps and defenses to the relevant process model assets, and also how They're involved. Irregular traffic styles indicating https://ieeexplore.ieee.org/document/9941250