Denial of company: the attacker exhausts the methods wanted to supply products and services to legitimate people. This action demonstrates the dependencies among attack classes and very low-amount element characteristics. Following that, the CVSS technique is used and scores are calculated to the elements during the tree. Other databases including https://ieeexplore.ieee.org/document/9941250