The most critical vulnerabilities might have instant focus to incorporate protection controls. The the very least important vulnerabilities may need no attention in any respect due to the fact there is small probability they will be exploited or they pose small Threat If they're. To model a more difficult circumstance https://ieeexplore.ieee.org/document/9941250