I
AE
S
I
nte
rna
t
io
na
l J
o
urna
l o
f
Art
if
icia
l In
t
ellig
ence
(
I
J
-
AI
)
Vo
l.
8
,
No
.
3
,
Sep
tem
b
er
201
9
,
p
p
.
278
~
285
I
SS
N:
2252
-
8938
,
DOI
: 1
0
.
1
1
5
9
1
/i
j
ai.
v
8
.i
3
.
p
p
278
-
2
8
5
278
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e
.
co
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
J
A
I
Intellig
ent
ris
k
ma
na
g
em
ent
f
ra
m
e
w
o
rk
Wis
s
a
m
A
bb
a
s
s
,
Z
ine
b B
a
k
r
a
o
uy
,
A
m
ine B
a
ina
,
M
o
s
t
a
f
a
B
ella
f
k
ih
Na
ti
o
n
a
l
In
st
it
u
te
o
f
P
o
sts a
n
d
T
e
lec
o
m
m
u
n
ica
ti
o
n
IN
P
T
,
M
a
d
i
n
a
t
A
l
Ir
f
a
n
e
,
Ra
b
a
t,
M
o
r
o
c
c
o
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
M
ay
1
1
,
2
0
1
9
R
ev
i
s
ed
J
u
l 2
9
,
2
0
1
9
A
cc
ep
ted
A
u
g
12
,
2
0
1
9
T
h
e
In
tern
e
t
o
f
T
h
in
g
s
(Io
T
)
is
ra
p
id
ly
in
c
re
a
sin
g
a
n
d
e
n
h
a
n
c
in
g
to
d
a
y
’
s
w
o
rld
b
y
in
tro
d
u
c
in
g
a
larg
e
se
t
o
f
in
terc
o
n
n
e
c
ted
d
e
v
ice
s.
S
e
v
e
r
a
l
b
e
n
e
f
icia
l
se
rv
ice
s
a
r
e
p
ro
d
u
c
e
d
b
y
th
e
se
d
e
v
ice
s
a
s
f
o
r
a
re
a
m
o
n
it
o
ri
n
g
a
n
d
p
r
o
c
e
ss
c
o
n
tro
l.
Ho
w
e
v
e
r,
Io
T
se
c
u
rit
y
is
stil
l
a
m
a
jo
r
p
ro
b
lem
.
In
f
a
c
t,
Io
T
’
s
e
c
u
rit
y
b
e
g
g
in
g
s
lar
g
e
l
y
w
h
it
h
a
n
e
ff
e
c
ti
v
e
Ris
k
M
a
n
a
g
e
m
e
n
t
p
ro
c
e
ss
.
Ho
w
e
v
e
r,
th
e
e
ss
e
n
se
o
f
th
is
p
ro
c
e
ss
is
to
a
c
q
u
ire
a
risk
in
v
e
n
to
ry
c
ib
li
n
g
th
e
Io
T
d
e
v
ice
s.
Ne
v
e
rth
e
les
s,
it
is
q
u
it
e
d
if
f
icu
lt
to
o
b
tain
i
n
g
th
is
latter
w
h
ich
si
g
n
if
ica
n
tl
y
a
d
d
s
c
o
m
p
li
c
a
ti
o
n
issu
e
s
to
th
e
Risk
M
a
n
a
g
e
m
e
n
t.
W
it
h
o
u
t
th
e
a
b
il
it
y
o
f
h
o
li
sticly
id
e
n
ti
fy
th
e
Io
T
c
rit
ic
a
l
d
e
v
ice
s,
in
a
c
c
u
ra
te
Ris
k
M
a
n
a
g
e
m
e
n
t
is
a
c
h
iev
e
d
w
h
ich
lea
d
s u
n
f
o
rtu
n
a
te
ly
to
n
o
v
e
l
risk
e
x
p
o
su
re
s.
T
ra
d
it
io
n
a
l
Risk
-
b
a
se
d
a
p
p
ro
a
c
h
e
s
f
a
il
s
d
ra
sti
c
a
ll
y
a
t
a
p
p
re
n
d
i
n
g
Io
T
’
p
o
ten
ti
a
l
a
tt
a
c
k
s.
T
h
e
d
y
n
a
m
ic
stru
c
tu
re
,
th
e
h
e
tere
g
o
u
n
s
n
a
tu
re
o
f
d
e
v
ice
s,
t
h
e
v
a
rio
u
s
se
c
u
rit
y
o
b
jec
ti
v
e
s
a
n
d
in
f
ra
stru
c
tu
re
p
e
rv
a
siv
e
n
e
ss
a
re
k
e
y
f
a
c
to
rs
im
p
a
c
ti
n
g
th
e
o
v
e
ra
ll
p
e
rf
o
m
a
n
c
e
.
T
h
u
s,
a
h
o
li
stic
Risk
M
a
n
a
g
e
m
e
n
t
witi
h
i
n
t
h
e
Io
T
is
in
d
isp
e
n
sa
b
le.
A
c
c
o
rd
in
g
ly
,
w
e
p
ro
p
o
se
a
n
in
telli
g
e
n
t
Risk
M
a
n
a
g
e
m
e
n
t
f
ra
m
e
w
o
rk
u
sin
g
M
o
b
il
e
A
g
e
n
ts
in
o
rd
e
r
to
d
e
li
v
e
r
p
re
v
e
n
ti
v
e
a
n
d
re
sp
o
n
siv
e
a
ss
e
ss
m
e
n
t.
K
ey
w
o
r
d
s
:
A
r
c
h
iMa
te
A
r
ti
f
icial
i
n
tel
lig
e
n
ce
C
o
n
v
o
lu
tio
n
al
n
e
u
r
al
n
e
t
w
o
r
k
I
n
ter
n
et
o
f
t
h
i
n
g
s
Mo
b
ile
ag
en
ts
Ness
u
s
P
DC
A
c
y
cle
R
is
k
m
a
n
a
g
e
m
en
t
Co
p
y
rig
h
t
©
2
0
1
9
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
W
is
s
a
m
A
B
B
A
S
S,
Natio
n
al
I
n
s
tit
u
te
o
f
P
o
s
ts
a
n
d
T
elec
o
m
m
u
n
icatio
n
I
NP
T
,
Ma
d
in
at
A
l
I
r
f
a
n
e,
R
ab
at,
Mo
r
o
cc
o
.
E
m
ail:
ab
b
ass
@
i
n
p
t.a
c.
m
a
1.
I
NT
RO
D
UCT
I
O
N
I
n
th
e
ac
tu
al
in
ter
co
n
n
ec
ted
er
a,
I
o
T
h
as
g
r
ad
u
all
y
attr
ac
t
ed
w
id
e
i
n
ter
est
f
o
r
s
m
ar
t
m
an
ag
e
m
e
n
t
an
d
m
o
n
ito
r
in
g
.
I
o
T
r
ef
er
s
to
th
e
u
b
iq
u
ito
u
s
n
et
w
o
r
k
o
f
ev
e
r
y
d
a
y
o
b
j
ec
ts
em
b
ed
d
ed
w
it
h
co
m
p
u
ti
n
g
d
e
v
ices.
I
t
m
er
g
es
d
if
f
er
en
t
tec
h
n
o
lo
g
i
es,
s
ta
n
d
ar
d
s
a
n
d
s
er
v
ices
i
n
o
r
d
er
to
s
u
p
p
o
r
t
in
tell
ig
e
n
t
d
ec
is
io
n
m
a
k
i
n
g
[
1
]
.
I
o
T
is
th
e
k
e
y
to
d
eliv
er
in
g
s
m
ar
t
s
er
v
ice
s
,
as
f
o
r
en
v
ir
o
n
m
en
t
m
o
n
ito
r
in
g
,
d
ev
ices
tr
ac
k
in
g
,
s
m
ar
t
b
u
ild
in
g
s
an
d
tr
af
f
icc
o
p
ti
m
izat
io
n
[
2
]
.
I
t
to
ler
ates
r
e
m
o
te
co
n
tr
o
l
o
f
t
h
ese
o
b
j
ec
ts
w
h
er
ef
o
r
e
th
e
in
t
eg
r
atio
n
o
f
d
i
v
er
s
e
ar
ch
itect
u
r
es,
d
esig
n
m
et
h
o
d
o
lo
g
ies
an
d
m
id
d
le
w
ar
e.
A
ct
u
all
y
,
I
o
T
'
o
b
j
ec
ts
co
llect
d
a
ta
u
s
i
n
g
d
is
tr
ib
u
te
d
s
en
s
o
r
s
an
d
tr
an
s
m
it
it
th
a
n
k
s
to
I
n
ter
n
et
p
r
o
to
co
ls
to
a
n
I
o
T
p
latf
o
r
m
f
o
r
p
r
o
ce
s
s
in
g
an
d
s
to
r
ag
e
[
3
]
.
I
o
T
’
d
ev
ices a
r
e
o
f
ten
co
n
tr
ac
ted
w
it
h
s
to
r
ag
e
i
s
s
u
es
w
h
ic
h
i
s
a
s
o
u
r
ce
o
f
d
iv
er
s
e
attac
k
s
.
On
e
v
u
l
n
er
ab
ilit
y
i
s
lik
el
y
to
b
e
ex
p
lo
ited
b
y
a
ttack
s
w
h
ic
h
allo
w
s
g
ai
n
i
n
g
p
r
iv
ileg
ed
ac
ce
s
s
to
th
e
e
n
tire
n
et
w
o
r
k
[
4
]
.
Mo
r
eo
v
er
,
d
u
e
to
I
n
ter
n
et
co
n
n
ec
tio
n
an
d
t
h
e
lac
k
o
f
s
ec
u
r
it
y
v
ar
io
u
s
d
ata
b
r
ea
ch
es
o
cc
u
r
lead
in
g
co
n
s
eq
u
e
n
tl
y
to
s
ev
er
al
s
ec
u
r
i
t
y
co
n
ce
r
n
s
[
5
]
.
B
ac
k
in
2
0
1
6
,
a
m
a
s
s
i
v
e
d
i
s
tr
ib
u
ted
d
en
ial
-
of
-
s
er
v
ice
(
D
Do
S)
attac
k
h
ad
m
an
a
g
ed
to
m
ak
e
t
h
o
u
s
an
d
o
f
t
h
e
I
n
ter
n
et
's
to
p
d
es
tin
atio
n
s
in
ac
ce
s
s
ib
le
[
6
]
.
C
o
n
s
id
er
in
g
t
h
e
h
ig
h
l
y
i
n
ter
c
o
n
n
ec
tio
n
o
f
t
h
ese
d
e
v
ices,
o
n
e
e
x
p
lo
ited
v
u
l
n
er
ab
ilit
y
g
r
a
n
ts
w
h
o
le
ac
ce
s
s
to
d
ata,
r
en
d
er
in
g
it
u
n
u
s
ab
le
[
7
]
.
Su
b
s
eq
u
en
tl
y
,
a
s
ev
er
y
d
a
y
o
b
j
ec
ts
b
ec
o
m
e
m
o
r
e
co
n
n
ec
ted
,
I
o
T
s
ec
u
r
it
y
b
ec
o
m
e
s
cr
u
cial.
Ma
n
ag
in
g
r
is
k
s
af
f
ec
ti
n
g
th
e
I
o
T
is
r
ef
lec
ted
co
m
p
le
x
as
r
eg
ar
d
f
o
r
th
e
lar
g
e
s
ca
le
o
f
th
e
co
n
n
ec
ted
d
ev
ices.
Mo
r
eo
v
er
,
w
it
h
t
h
e
p
er
p
etu
al
in
ter
ac
tio
n
o
f
th
ese
d
ev
ice
s
n
o
v
el
th
r
ea
t
s
ar
e
o
n
th
e
r
is
e
[
8
]
.
I
n
f
ac
t,
co
n
s
id
er
in
g
t
h
e
i
n
ter
co
n
n
ec
ted
i
n
f
r
astru
c
tu
r
e
o
f
t
h
e
I
o
T
’
d
ev
ices,
a
d
i
s
tr
ib
u
te
d
R
is
k
Ma
n
ag
e
m
e
n
t
s
o
lu
tio
n
in
h
i
g
h
l
y
r
eq
u
ir
ed
.
A
cc
o
r
d
in
g
l
y
,
th
i
s
p
ap
er
p
r
o
p
o
s
es
an
i
n
tell
ig
e
n
t
R
is
k
Ma
n
ag
e
m
e
n
t
f
r
a
m
e
w
o
r
k
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
-
AI
I
SS
N:
2252
-
8938
I
n
tellig
en
t ris
k
ma
n
a
g
eme
n
t fr
a
mewo
r
k
(
Wis
s
a
m
A
b
b
a
s
s
)
279
u
s
i
n
g
Mo
b
ile
Ag
e
n
ts
i
n
o
r
d
er
to
d
eliv
er
p
r
ev
e
n
ti
v
e
a
n
d
r
esp
o
n
s
i
v
e
a
s
s
es
s
m
en
t.
I
n
d
ee
d
,
u
s
in
g
Mo
b
ile
Ag
e
n
ts
is
p
r
ac
ticall
y
s
u
itab
le
f
o
r
d
is
tr
ib
u
ted
s
y
s
te
m
s
s
u
c
h
as
th
e
I
o
T
.
T
h
e
p
r
o
p
o
s
ed
Fra
m
e
w
o
r
k
co
n
s
id
er
s
t
w
o
m
ai
n
co
m
p
o
n
e
n
t
s
:
p
r
ev
e
n
ti
v
e
an
d
r
esp
o
n
s
iv
e.
O
n
o
n
e
h
a
n
d
,
t
h
e
p
r
ev
en
ti
v
e
co
m
p
o
n
e
n
t
ap
p
lies
C
o
n
v
o
lu
t
io
n
al
Neu
r
al
Net
w
o
r
k
f
o
r
r
is
k
id
en
t
if
icatio
n
an
d
clas
s
i
f
icatio
n
.
O
n
th
e
o
t
h
er
h
a
n
d
,
a
r
esp
o
n
s
iv
e
co
m
o
e
n
en
t
d
ea
li
n
g
w
it
h
t
h
e
I
o
T
d
y
n
a
m
ic
e
n
v
ir
o
n
m
e
n
t.
I
n
d
ee
d
,
th
e
co
m
b
in
atio
n
o
f
p
r
ev
en
ti
v
e
an
d
r
esp
o
n
s
i
v
e
ap
p
r
o
ac
h
es
d
eliv
er
ed
v
alu
ab
le
r
es
u
lt
s
.
I
n
f
ac
t,
th
e
R
esp
o
n
s
i
v
e
R
i
s
k
An
a
l
y
s
i
s
i
n
v
e
s
ti
g
ates
all
t
h
e
r
ele
v
an
t
r
is
k
s
ea
r
lier
,
s
o
a
cc
o
r
d
in
g
l
y
b
e
f
o
r
e
th
eir
p
o
ten
tial
o
cc
u
r
r
en
ce
.
T
h
is
i
n
v
esti
g
atio
n
i
s
th
e
n
tailo
r
ed
as
a
Mo
d
el
-
b
ase,
w
h
ic
h
a
m
o
b
ile
a
g
en
t
i
s
r
esp
o
n
s
ib
le
f
o
r
its
m
an
a
g
e
m
e
n
t.
Mo
b
ile
A
g
e
n
t
s
tech
n
o
lo
g
y
i
s
th
e
k
e
y
co
m
b
in
i
n
g
th
e
p
r
ev
en
ti
v
e
a
n
d
r
esp
o
n
s
iv
e
a
p
p
r
o
ac
h
es,
s
h
i
f
ti
n
g
t
h
u
s
r
i
s
k
co
u
n
ter
m
ea
s
u
r
es
d
ec
is
io
n
s
f
r
o
m
th
e
p
r
ev
e
n
ti
v
e
ap
p
r
o
ac
h
to
th
e
r
esp
o
n
s
iv
e
o
n
e.
O
u
r
co
n
tr
ib
u
t
io
n
g
r
an
t
s
s
ec
u
r
it
y
f
o
r
C
lo
u
d
o
f
t
h
in
g
s
w
it
h
o
u
t
i
n
f
lu
e
n
ci
n
g
its
p
er
f
o
r
m
an
ce
.
T
h
e
p
ap
er
s
la
y
o
u
t
is
o
r
g
a
n
ized
ac
co
r
d
in
g
l
y
in
to
f
o
u
r
s
ec
tio
n
s
:
th
e
f
ir
s
t
s
ec
tio
n
r
ev
ie
w
s
th
e
R
is
k
Ma
n
a
g
e
m
en
t
co
m
p
o
n
en
t
s
,
in
cl
u
d
es
r
elate
d
w
o
r
k
an
d
in
tr
o
d
u
ce
s
t
h
e
r
esear
ch
m
et
h
o
d
.
T
h
e
s
ec
o
n
d
s
ec
tio
n
d
etails
t
h
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
.
T
h
e
th
ir
d
s
ec
tio
n
h
i
g
h
l
ig
h
t
s
an
e
x
p
er
im
e
n
tal
a
n
al
y
s
i
s
clar
if
y
in
g
t
h
e
k
e
y
v
al
u
e
o
f
t
h
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
.
Fi
n
all
y
,
co
n
s
tr
u
ct
iv
e
f
i
n
d
in
g
s
ar
e
p
in
p
o
in
ted
.
2.
M
AT
E
RIAL
S AN
D
M
E
T
H
O
DS
2
.
1
.
I
o
T
’
risk
m
a
na
g
e
m
ent
I
o
T
’
R
is
k
Ma
n
ag
e
m
e
n
t
p
r
o
ce
s
s
is
a
co
u
n
ti
n
o
u
s
p
r
o
ce
s
s
o
f
m
o
d
eli
n
g
th
e
ex
p
o
s
u
r
e
o
f
th
e
co
n
n
ec
ted
d
ev
ices
to
r
is
k
[
9
]
.
I
t
allo
w
s
id
en
ti
f
i
y
in
g
,
ass
e
s
s
i
n
g
an
d
m
itig
ati
n
g
th
e
p
o
ten
tial
r
is
k
s
t
h
at
m
a
y
p
o
ten
tiall
y
h
ar
m
t
h
e
o
v
er
all
p
er
f
o
r
m
a
n
ce
[
1
0
]
.
Fig
u
r
e
1
d
ep
icts
R
is
k
co
n
s
i
s
ts
o
f
a
p
o
ten
tial
th
r
ea
t
la
u
n
c
h
i
n
g
a
n
attac
k
ag
ain
t
a
d
ev
ice’
s
v
u
l
n
er
ab
ilit
y
in
o
r
d
er
to
n
eg
ati
v
el
y
i
m
p
ac
t
its
p
er
f
o
r
m
an
ce
.
A
cc
o
d
ir
n
g
l
y
,
R
i
s
k
Ma
n
ag
e
m
e
n
t
is
co
m
m
o
n
l
y
ap
p
lied
in
o
r
d
er
to
ap
p
ly
e
f
f
cien
t
co
u
n
ter
m
ea
s
u
r
es
s
tr
e
n
g
th
e
n
i
n
g
d
ev
i
ce
s
’
v
u
l
n
er
ab
ilit
ie
s
.
I
o
T
’
R
i
s
k
Ma
n
a
g
e
m
e
n
t
p
r
o
ce
s
s
co
n
s
is
t
s
o
f
f
o
u
r
m
ai
n
s
tep
s
:
r
i
s
k
id
en
ti
f
ica
tio
n
,
as
s
es
s
e
m
e
n
t,
m
iti
g
atio
n
an
d
m
o
n
ir
o
tin
g
[
1
1
]
.
A
s
d
ep
icted
in
Fig
u
r
e
2
,
th
e
f
ir
s
t
s
tep
co
n
s
id
er
s
id
e
n
tify
i
n
g
t
h
e
cr
itical
d
ev
ices
an
d
t
h
e
r
elate
d
s
ec
u
r
it
y
o
b
j
ec
tiv
es.
R
is
k
ass
e
s
s
m
en
t
is
t
h
e
co
r
e
s
tep
o
f
th
e
w
h
o
le
p
r
o
ce
s
s
as
it
d
eter
m
in
e
s
th
e
r
is
k
’
s
p
r
o
b
ab
ilit
y
o
f
o
cc
u
r
r
e
n
ce
an
d
i
m
p
ac
t
s
.
R
is
k
Miti
g
atio
n
allo
w
s
d
ec
id
in
g
t
h
e
ad
eq
u
ate
co
u
n
ter
m
ea
s
u
r
e
w
h
i
le
R
i
s
k
M
o
n
ito
r
in
g
to
ler
ates
ch
ec
k
i
n
g
t
h
e
ad
eq
u
ac
y
p
f
t
h
e
c
h
o
s
en
co
u
n
ter
m
ea
s
u
r
es
a
n
d
s
er
v
es
a
s
a
k
e
y
es
s
en
ce
o
f
l
au
n
c
h
i
n
g
a
n
e
w
R
is
k
I
d
en
ti
f
icatio
n
.
R
is
k
Mo
n
i
to
r
in
g
ai
m
s
to
g
u
ar
an
tee
t
h
e
r
eliab
ilit
y
o
f
ea
c
h
R
i
s
k
Ma
n
a
g
e
m
en
t step
.
Fig
u
r
e
1
.
I
o
T
’
R
is
k
Ma
n
a
g
e
m
en
t c
o
r
e
co
n
ce
p
ts
Fig
u
r
e
2
.
I
o
T
’
R
is
k
Ma
n
a
g
e
m
en
t
m
a
in
s
tep
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8938
IJ
-
AI
Vo
l.
8
,
No
.
3
,
Sep
tem
b
er
20
1
9
:
2
7
8
–
2
8
5
280
I
o
T
’
d
y
n
a
m
ic
s
tr
u
ctu
r
e
co
m
p
li
ca
tes
R
is
k
Ma
n
ag
e
m
e
n
t
p
r
o
ce
s
s
.
I
n
f
ac
t,
I
o
T
d
ev
ices
ar
e
co
n
ti
n
u
o
u
s
l
y
in
ter
ac
ti
n
g
w
h
ic
h
g
i
v
es
r
is
e
to
n
o
v
el
r
is
k
e
x
p
o
s
u
r
es
[
1
2
]
.
Mo
r
eo
v
er
,
th
e
in
ter
co
n
n
ete
d
d
ev
ices
ar
e
n
o
t
m
an
a
g
ed
a
s
t
h
e
tr
ad
itio
n
al
d
ev
ices
w
h
er
e
th
e
f
ac
t
as
t
h
e
y
ar
e
o
f
ten
d
eig
n
ated
a
s
a
u
t
o
m
a
te
e
n
titi
e
s
[
1
3
]
.
Ho
w
e
v
er
,
th
e
ab
s
e
n
ce
o
f
a
co
m
m
o
n
f
r
a
m
e
w
o
r
k
e
m
er
g
ed
a
n
in
co
n
s
is
te
n
c
y
at
a
s
s
e
s
s
i
n
g
r
is
k
[
1
4
]
.
Var
io
u
s
ch
al
len
g
es
f
ac
i
n
g
I
o
T
R
is
k
Ma
n
g
e
m
en
t e
x
i
s
t:
1.
I
n
cr
ea
s
ed
n
u
m
b
er
o
f
d
ev
ice
s
.
2.
P
er
p
etu
al
d
ev
ices’
co
m
m
u
n
ica
ti
o
n
in
co
r
p
o
r
atin
g
s
en
s
iti
v
e
d
ata
s
h
ar
i
n
g
.
3.
I
m
p
o
ten
t d
ev
ice
s
’
i
n
v
en
to
r
y
.
4.
Dev
ices
’
co
m
p
le
x
it
y
at
d
eter
m
i
n
in
g
a
v
u
l
n
er
ab
ilit
y
i
m
p
ac
t.
5.
C
o
n
v
o
lu
ted
p
er
ce
p
tio
n
o
f
a
r
is
k
’
s
attac
k
ex
p
an
s
io
n
.
R
is
k
Ma
n
ag
e
m
e
n
t
w
i
th
i
n
t
h
e
I
o
T
allo
w
s
a
s
s
es
s
i
n
g
th
e
p
o
ten
tial
t
h
r
ea
ts
t
h
r
e
ate
n
in
g
t
h
e
d
ev
ice
s
s
ec
u
r
it
y
.
I
n
d
ee
d
,
SR
A
w
i
th
i
n
th
e
I
o
T
is
c
o
n
v
u
lted
,
w
el
l
m
ain
l
y
d
u
e
to
th
e
ex
ter
n
a
l
d
ata
s
to
r
ag
e
an
d
p
r
o
ce
s
s
in
g
f
u
n
c
tio
n
s
b
et
w
ee
n
I
o
T
‘
h
eter
o
g
e
n
eo
u
s
d
e
v
ices.
T
h
e
g
o
al
o
f
o
u
r
r
esear
c
h
m
et
h
o
d
is
:
1.
Dete
r
m
i
n
i
n
g
I
o
T
d
ev
ices in
v
e
n
to
r
y
,
2.
Ass
u
r
in
g
I
o
T
d
ev
ices secu
r
it
y
,
3.
I
d
en
tif
i
y
i
n
f
s
ec
u
r
i
t
y
p
r
o
f
ile
s
,
4.
Def
i
n
i
n
g
e
f
f
icie
n
t v
u
l
n
er
ab
ilit
y
r
ep
o
r
ts
,
5.
Ou
tli
n
i
n
g
r
ea
l
-
ti
m
e
m
o
n
ito
r
i
n
g
.
A
ct
u
all
y
,
I
o
T
d
ev
ices
in
cl
u
d
e
n
o
e
m
b
ed
d
ed
s
ec
u
r
it
y
w
h
ic
h
i
s
q
u
ite
ap
p
elin
g
f
o
r
attac
k
s
.
As
a
m
atter
o
f
a
f
ac
t,
I
o
T
’
s
ec
u
r
it
y
b
eg
g
in
g
s
lar
g
el
y
w
h
i
th
a
n
ef
f
ec
ti
v
e
R
is
k
Ma
n
ag
e
m
e
n
t
p
r
o
ce
s
s
.
Ho
w
e
v
er
,
th
e
ess
e
n
s
e
o
f
th
is
p
r
o
ce
s
s
is
to
ac
q
u
ir
e
a
r
is
k
in
v
en
to
r
y
c
ib
lin
g
th
e
I
o
T
d
ev
ices.
Nev
er
th
e
less
,
it
i
s
q
u
ite
d
i
f
f
icu
l
t
to
o
b
tain
in
g
th
is
la
tter
w
h
ic
h
s
i
g
n
i
f
ican
tl
y
ad
d
s
co
m
p
l
icatio
n
is
s
u
e
s
to
th
e
R
i
s
k
Ma
n
a
g
e
m
en
t.
I
n
f
ac
t,
in
o
r
d
er
to
f
u
ll
y
ac
n
k
o
w
ld
g
e
I
o
T
b
en
ef
its
,
it i
s
m
an
d
ato
r
y
to
ap
p
l
y
a
d
ee
p
a
n
a
l
y
s
i
s
o
f
t
h
e
p
o
ten
tial
r
is
k
s
th
at
m
a
y
i
n
f
lu
e
n
ce
t
h
e
o
v
er
all
s
ec
u
r
it
y
.
2
.
2
.
Rela
t
ed
wo
rk
Usi
n
g
A
r
t
if
ic
ial
I
n
te
lli
g
en
ce
in
a
q
u
e
s
t
f
o
r
en
h
an
c
in
g
R
is
k
Ma
n
ag
e
m
e
n
t
i
s
t
h
e
f
o
c
u
s
o
f
v
ar
io
u
s
r
esear
ch
w
o
r
k
.
Z
ie
g
ler
&
al.
[
1
5
]
r
elied
o
n
Mo
b
ile
A
g
e
n
ts
in
o
r
d
er
to
p
r
o
v
id
e
a
s
e
cu
r
it
y
an
d
p
r
i
v
ac
y
ap
p
r
o
ac
h
.
Ho
w
e
v
er
,
th
e
ir
ap
p
r
o
ac
h
f
ail
a
t h
o
li
s
ticl
y
e
n
h
a
n
ce
p
u
b
lic
tr
u
s
t.
Ga
m
e
th
eo
r
y
h
as
b
ee
n
th
e
k
e
y
f
o
c
u
s
o
f
A
b
ie
&
al.
[
1
6
]
at
esti
m
at
in
g
a
n
d
p
r
ed
ictin
g
r
i
s
k
i
m
p
ac
ts
w
it
h
in
a
n
eh
ea
lth
I
o
T
.
De
n
g
&
al.
[
1
7
]
u
s
ed
m
ac
h
in
e
lear
n
i
n
g
m
et
h
o
d
s
i
n
o
r
d
er
to
d
eter
m
i
n
e
t
h
e
n
et
wo
r
k
’
s
in
tr
u
s
io
n
r
i
s
k
s
.
L
i
u
&
al.
[
1
8
]
p
r
o
p
o
s
ed
a
d
y
n
a
m
ical
r
i
s
k
as
s
ess
m
e
n
t
b
y
r
el
y
in
g
o
n
A
r
ti
f
icial
I
m
m
u
n
e
S
y
s
te
m
in
o
r
d
er
to
d
ed
u
ce
s
u
s
p
icio
u
s
ev
e
n
t
s
.
Nu
r
s
e
&
al.
[
1
9
]
b
u
ild
ed
an
im
p
ac
t
ass
e
s
s
m
e
n
t
m
o
d
el
b
y
co
n
s
id
er
in
g
th
e
d
y
n
a
m
ics
a
n
d
u
n
iq
u
e
n
es
s
o
f
th
e
I
o
T
en
v
ir
o
n
e
m
e
n
t.
W
e
h
a
v
e
i
n
p
r
ev
io
u
s
w
o
r
k
u
s
ed
Dee
p
L
ea
r
n
in
g
alo
g
ir
t
h
m
f
o
r
class
if
y
i
n
g
I
o
T
’
r
is
k
s
[
2
0
]
.
A
r
ti
f
icial
i
n
tel
lig
e
n
ce
e
n
h
a
n
d
e
s
s
i
g
n
i
f
ica
n
tl
y
r
is
k
s
id
en
ti
f
y
i
n
g
an
d
an
al
y
s
is
[
2
0
]
.
3.
I
NT
E
L
L
I
G
E
N
T
RIS
K
M
ANAG
E
M
E
NT
F
RAM
E
WO
RK
A
s
s
h
o
w
n
in
Fig
u
r
e
3
,
th
e
p
r
o
p
o
s
e
d
f
r
am
e
w
o
r
k
’
f
o
ll
o
w
s
a
“
Do
-
A
ct
-
C
h
ec
k
”
cy
cle
:
1.
A
p
r
ev
en
tiv
e
R
is
k
A
n
aly
s
i
s
f
r
am
e
w
o
r
k
w
h
ich
is
th
e
“
D
o
”
p
h
ase
.
I
t
s
u
p
p
o
r
ts
im
p
l
em
en
tin
g
s
ec
u
r
ity
m
ea
s
u
r
es
b
ef
o
r
e
r
is
k
s
y
m
p
to
m
s
m
an
if
est.
T
h
e
p
r
ev
en
tiv
e
m
an
ag
e
m
en
t
d
el
iv
er
s
an
in
v
e
n
to
r
y
o
f
th
e
r
is
k
p
r
o
f
il
es th
at
all
o
w
id
en
t
if
y
in
g
th
e
c
r
i
tic
al
d
ev
ices
.
I
t
d
et
ec
ts
a
n
d
s
ty
m
ies
I
o
T
-
b
as
e
d
atta
ck
s
.
I
t
d
o
es
i
d
en
tif
y
r
is
k
b
u
t
d
o
es
n
o
t
ex
p
li
cit
ly
ad
d
r
ess
i
t.
Mo
r
e
o
v
e
r
,
it
d
esc
r
i
b
e
s
th
e
k
ey
f
ac
t
o
r
s
th
at
w
o
u
ld
d
r
iv
e
r
is
k
s
an
d
p
r
o
v
i
d
es
g
u
i
d
an
c
e
f
o
r
d
e
ci
d
i
n
g
s
ec
u
r
ity
co
u
n
te
r
m
ea
s
u
r
es
,
v
iew
p
o
in
ts
,
an
d
p
at
te
r
n
s
th
at
w
o
u
ld
h
el
p
s
ec
u
r
ity
m
an
ag
er
s
b
ett
er
d
ev
e
l
o
p
s
e
cu
r
ity
m
o
d
els
.
2.
Mo
b
il
e
A
g
en
ts
ar
e
co
n
s
i
d
er
ed
as
th
e
“A
ct”
p
h
ase
.
Use
d
as
r
is
k
s
en
s
o
r
s
em
b
ed
d
e
d
at
I
o
T
d
ev
ic
es,
th
es
e
ag
en
ts
h
el
p
r
ep
o
r
t
r
is
k
asy
n
ch
r
o
n
o
u
s
ly
an
d
au
t
o
n
o
m
o
u
s
ly
.
Du
e
to
th
e
ir
au
t
o
n
o
m
o
u
s
asp
e
ct
w
ith
in
th
e
I
o
T
in
f
r
ast
r
u
cu
t
r
e
,
th
ey
ar
e
m
ain
ly
u
s
ed
f
o
r
th
ei
r
a
b
il
ity
to
o
p
e
r
a
te
asy
n
ch
r
o
n
o
u
s
ly
an
d
au
t
o
n
o
m
o
u
s
l
y
o
f
th
e
p
r
o
ce
s
s
r
es
p
o
n
s
i
b
le
f
o
r
c
r
af
tin
g
it.
I
n
d
e
ed
,
th
ey
ar
e
c
o
n
s
id
e
r
ed
as
a
r
is
k
s
en
s
o
r
s
th
a
t
c
o
l
le
ct
r
el
ev
an
t
r
e
al
tim
e
d
a
ta
.
3.
A
r
esp
o
n
s
iv
e
R
is
k
A
n
aly
s
is
f
r
am
e
w
o
r
k
w
h
ich
is
th
e
“
C
h
e
ck
”
p
h
ase
,
i
t
r
esp
o
n
d
s
t
o
r
i
s
k
s
af
ter
th
ey
h
av
e
h
a
p
p
en
e
d
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
-
AI
I
SS
N:
2252
-
8938
I
n
tellig
en
t ris
k
ma
n
a
g
eme
n
t fr
a
mewo
r
k
(
Wis
s
a
m
A
b
b
a
s
s
)
281
Fig
u
r
e
3
.
I
n
tellig
e
n
t
R
is
k
Ma
n
ag
e
m
e
n
t
f
r
a
m
e
w
o
r
k
Usi
n
g
t
h
e
P
DC
A
c
y
cle
allo
ws
m
atc
h
i
n
g
I
o
T
’
d
y
n
a
m
ic
in
f
r
astru
ct
u
r
e.
I
n
f
ac
t,
it
s
tar
t
s
with
a
“
P
lan
p
h
a
s
e”
w
h
ic
h
co
n
s
id
er
s
:
1.
Sco
p
e
d
ef
in
itio
n
,
2.
Gath
er
i
n
g
a
d
ev
ice
s
in
v
e
n
to
r
y
,
3.
C
r
itical
d
ev
ice
s
id
en
ti
f
icatio
n
.
T
h
e
p
lan
n
in
g
p
h
ase
r
ep
r
esen
t
s
a
k
e
y
ele
m
e
n
t
p
r
o
m
o
ti
n
g
th
e
cr
itical
d
ev
ices
w
h
ic
h
w
o
u
ld
c
o
n
s
is
t
th
e
m
ai
n
tar
g
et.
T
h
e
“
Do
p
h
ase”
co
n
s
id
er
s
p
er
ce
iv
in
g
a
n
d
p
r
ed
ictin
g
r
i
s
k
o
cc
u
r
en
ce
.
A
s
r
ela
ted
i
n
Fi
g
u
r
e
4
,
it
lau
n
c
h
e
s
t
w
o
a
g
en
t
s
:
t
h
e
C
o
ll
ec
to
r
Ag
en
t
“
Nes
s
u
s
”
co
llecti
n
g
d
ata
r
elate
d
to
v
u
l
n
er
ab
ilit
i
es
an
d
t
h
e
An
al
y
s
er
Ag
e
n
t “
A
r
c
h
iMa
te”
a
n
al
y
s
ez
i
n
n
g
t
h
is
d
ata
i
n
o
r
d
er
to
id
en
tify
t
h
e
p
o
ten
tia
l r
is
k
s
an
d
t
h
eir
co
u
n
ter
m
ea
s
u
r
es.
Fig
u
r
e
4
.
P
r
ev
en
t
iv
e
R
is
k
A
s
s
ess
e
m
en
t
T
h
e
Ness
u
s
to
o
l
h
elp
s
b
en
e
f
iciall
y
d
etec
t
v
u
l
n
er
ab
ilit
ies
th
at
w
o
u
ld
e
x
p
lo
it
an
in
f
r
astru
ct
u
r
e.
C
h
o
o
s
i
n
g
Nes
s
u
s
is
b
ased
o
n
th
e
f
ac
t
th
at
it
u
s
e
s
a
g
e
n
ts
t
h
a
t
p
er
f
o
r
m
s
ca
n
n
i
n
g
i
n
s
tr
u
ctio
n
s
an
d
r
ep
o
r
t
it
to
a
ce
n
tr
al
Nes
s
u
s
Ma
n
a
g
er
.
Ne
s
s
u
s
c
u
m
u
lates
t
h
e
s
ec
u
r
it
y
m
o
d
els,
w
h
ic
h
ar
e
f
u
r
t
h
er
s
cr
u
ti
n
ized
b
y
A
r
c
h
iMa
te.
T
h
e
Secu
r
it
y
Mo
d
el
-
b
ase
in
c
lu
d
es
r
is
k
s
ce
n
ar
io
s
an
d
t
h
e
s
ec
u
r
it
y
p
o
licie
s
.
A
l
l
th
e
r
is
k
id
en
tif
icat
io
n
an
d
an
al
y
s
es
m
ad
e
b
y
t
h
e
P
r
ev
en
ti
v
e
R
is
k
A
s
s
es
s
m
e
n
t
p
h
a
s
e
ar
e
r
ep
r
esen
ted
as
s
ec
u
r
it
y
m
o
d
el
s
.
I
n
f
ac
t,
it
allo
w
s
u
n
d
er
s
ta
n
d
in
g
an
d
e
v
al
u
ati
n
g
s
ec
u
r
it
y
r
is
k
e
x
p
o
s
u
r
es.
I
t
i
s
co
n
s
id
er
ed
as
a
r
is
k
in
v
e
n
to
r
y
t
h
at
co
n
tai
n
s
t
h
e
cr
itical
I
o
T
d
ev
ices.
4.
CO
M
P
UT
AT
I
O
NAL A
NAL
YSI
S
Fig
u
r
e
5
s
h
o
w
Ne
s
s
u
s
V
u
ln
er
ab
ilit
y
.
I
n
o
r
d
er
to
h
ig
h
l
ig
h
t
t
h
e
f
ea
s
ib
ilit
y
o
f
th
e
p
r
o
p
o
s
ed
f
r
a
m
e
w
o
r
k
,
w
e
p
er
f
o
r
m
f
ir
s
tl
y
a
P
r
ev
en
tiv
e
R
is
k
A
s
s
ess
m
e
n
t,
w
h
ich
i
n
cl
u
d
es:
1.
Vu
l
n
er
ab
ilit
y
as
s
es
s
m
e
n
t:
Fir
s
t,
w
e
h
a
v
e
p
er
f
o
r
m
ed
t
h
e
v
u
ln
er
ab
ili
t
y
ass
e
s
s
m
e
n
t
u
s
in
g
Ness
u
s
.
I
t
h
as
b
en
ef
icia
ll
y
h
elp
ed
u
n
d
e
r
s
ta
n
d
in
g
al
l
t
h
e
ex
is
ti
n
g
v
u
l
n
er
ab
ilit
ies
a
n
d
th
e
ir
i
m
p
ac
t.
I
t
h
as
also
s
u
p
p
o
r
ted
w
h
er
e
b
est to
f
o
cu
s
s
ec
u
r
it
y
c
o
n
tr
o
ls
.
2.
R
is
k
as
s
ess
m
e
n
t:
A
r
c
h
iMa
te
i
d
en
tifie
s
t
h
e
th
r
ea
t
s
th
at
w
o
u
l
d
tar
g
et
th
e
cr
itical
I
o
T
d
ev
ices.
Fig
u
r
e
5
.
Ness
u
s
V
u
ln
er
ab
ilit
y
r
ep
o
r
t e
x
p
o
r
t
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8938
IJ
-
AI
Vo
l.
8
,
No
.
3
,
Sep
tem
b
er
20
1
9
:
2
7
8
–
2
8
5
282
Af
ter
i
m
p
o
r
ti
n
g
t
h
e
Ness
u
s
o
u
tp
u
t
f
ile
w
h
ic
h
th
e
e
x
ti
n
ctio
n
i
s
“
.
cs
v
”,
A
r
ch
iMa
te
in
ter
p
r
ets
it
w
it
h
it
s
o
w
n
E
n
ter
p
r
is
e
A
r
c
h
itect
u
r
e
Ma
n
ag
e
m
e
n
t
co
n
ce
p
t
s
.
Fi
g
u
r
e
6
p
in
p
o
in
ts
t
h
e
A
r
ch
iMa
te
in
ter
p
r
etatio
n
o
f
t
h
e
Ness
u
s
“
.
cs
v
”
o
u
tp
u
t.
Fig
u
r
e
6
.
A
r
ch
iMa
te
v
u
l
n
er
ab
ilit
ies as
s
es
s
m
e
n
t
Af
ter
t
h
e
v
u
l
n
er
ab
ilit
ies
id
en
t
if
ied
b
y
Ne
s
s
u
s
ar
e
m
o
d
elled
b
y
A
r
c
h
iMa
te,
t
h
e
id
en
ti
f
icati
o
n
o
f
r
is
k
s
ce
n
ar
io
s
i
s
th
u
s
ac
co
m
p
l
is
h
e
d
as d
escr
ib
ed
in
Fig
u
r
e
7
.
Fig
u
r
e
7
.
A
r
ch
iMa
te
r
is
k
ass
e
s
s
m
e
n
t
3.
Secu
r
it
y
Mo
d
el
-
B
ase:
th
i
s
ac
ti
v
it
y
s
to
r
es
th
e
s
ec
u
r
it
y
m
ea
s
u
r
es
tak
en
i
n
o
r
d
er
to
p
r
ev
en
t
r
is
k
o
cc
u
r
r
en
ce
.
I
t
also
d
etails
th
e
d
ec
is
io
n
s
m
ad
e
f
o
r
r
ea
l
-
ti
m
e
r
is
k
s
it
u
at
io
n
s
.
I
t
s
i
m
p
l
y
e
n
co
u
n
ter
s
t
h
e
p
o
ten
tial
r
is
k
s
.
Fu
r
t
h
er
m
o
r
e,
th
e
s
ec
u
r
it
y
Mo
d
el
-
b
ase
en
co
m
p
ass
e
s
co
n
s
is
te
n
t d
ata
o
f
th
e
en
t
ir
e
I
o
T
in
f
r
astr
u
cu
tr
e.
Fig
u
r
e
8
s
h
o
w
s
t
h
e
A
r
c
h
i
Ma
te
R
i
s
k
Ass
es
s
m
en
t
o
u
t
p
u
t
w
h
ic
h
h
as
th
e
“
.
x
m
l”
ex
ti
n
ctio
n
.
T
h
is
ex
ti
n
ctio
n
w
o
u
ld
allo
w
u
s
t
h
u
s
to
a
f
u
r
t
h
er
co
n
ce
p
ti
o
n
o
f
s
ec
u
r
it
y
p
o
licies.
A
s
a
co
m
p
le
m
e
n
t
o
f
o
u
r
co
m
p
u
ta
tio
n
al
an
al
y
s
is
,
w
e
p
er
f
o
r
m
th
e
n
a
r
esp
o
n
s
iv
e
r
is
k
a
n
al
y
s
i
s
,
w
h
ic
h
co
m
p
r
is
e
s
:
R
ea
l
-
ti
m
e
r
is
k
m
it
ig
at
in
g
:
Mo
b
ile
ag
e
n
ts
w
it
h
s
ta
n
d
r
is
k
s
as
f
au
lt
-
to
ler
an
t
s
y
s
te
m
s
.
I
n
f
ac
t,
th
e
y
w
o
r
k
as
s
en
s
o
r
s
th
at
i
n
s
tan
t
l
y
b
lo
ck
m
alicio
u
s
tr
a
f
f
ic.
T
h
e
m
ai
n
r
ea
s
o
n
o
f
ch
o
o
s
i
n
g
Mo
b
ile
Ag
e
n
ts
is
d
u
e
to
th
eir
s
w
i
f
tn
e
s
s
to
s
y
n
c
an
d
tr
an
s
f
e
r
m
e
s
s
a
g
es
b
et
w
ee
n
I
o
T
d
ev
ices.
R
esp
o
n
s
iv
e
R
is
k
Ass
e
s
s
m
en
t
allo
w
s
a
co
n
tin
u
o
u
s
m
o
n
ito
r
in
g
,
as
s
es
s
m
en
t
a
n
d
o
p
ti
m
izin
g
.
Nev
er
t
h
eless
,
i
t
d
o
es
n
o
t
p
er
f
o
r
m
R
is
k
A
n
al
y
s
is
o
n
a
d
ail
y
b
asi
s
b
u
t
i
n
s
tea
d
tr
ea
ts
th
e
o
u
tp
u
t
g
iv
e
n
b
y
P
r
ev
en
ti
v
e
R
is
k
Ass
e
s
s
m
e
n
t,
w
h
ic
h
i
s
s
to
r
ed
i
n
t
h
e
s
ec
u
r
it
y
Mo
d
el
-
b
ase
a
n
d
is
a
v
ailab
le
i
n
r
ea
l
-
ti
m
e.
T
h
u
s
,
P
r
ev
en
ti
v
e
R
i
s
k
A
s
s
es
s
m
e
n
t
d
ig
est
th
is
o
u
tp
u
t
an
d
co
r
r
elate
w
it
h
Mo
b
ile
Ag
en
t
s
i
n
o
r
d
er
to
,
d
ec
id
e
r
is
k
m
iti
g
atio
n
w
it
h
o
u
t
d
ela
y
.
I
t
co
n
v
e
n
e
s
t
h
e
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
-
AI
I
SS
N:
2252
-
8938
I
n
tellig
en
t ris
k
ma
n
a
g
eme
n
t fr
a
mewo
r
k
(
Wis
s
a
m
A
b
b
a
s
s
)
283
Ness
u
s
v
u
l
n
er
ab
ilit
y
ass
e
s
s
m
en
t
d
ata
w
i
th
t
h
e
n
et
w
o
r
k
b
eh
av
io
u
r
al
d
ata,
w
h
ic
h
r
elate
s
to
a
g
en
u
in
e
r
ea
l
-
ti
m
e
p
ictu
r
e
o
f
t
h
e
p
o
s
s
ib
l
e
o
cc
u
r
r
in
g
attac
k
s
.
Fig
u
r
e
8
.
A
r
ch
i
m
ate
R
is
k
Ass
ess
m
en
t
XM
L
o
u
tp
u
t
Fig
u
r
e
9
s
h
o
w
t
h
e
f
r
a
m
e
w
o
r
k
’
s
class
d
ia
g
r
a
m
.
T
h
e
m
ai
n
o
b
jects o
f
th
e
f
r
a
m
e
w
o
r
k
’
s
clas
s
d
iag
r
a
m
ar
e:
“
Mo
b
ile_
A
g
e
n
t”
cla
s
s
is
th
e
g
en
er
al
class
w
h
ic
h
m
o
d
el
s
a
Mo
b
ile
Ag
en
t.
“Co
llecto
r
“
cla
s
s
is
d
ed
icate
d
to
p
er
f
o
r
m
v
u
l
n
er
ab
ilit
ies d
etec
ti
o
n
.
“An
al
y
s
er
”
clas
s
ac
h
iev
e
s
r
is
k
as
s
es
s
m
e
n
t.
“L
o
ca
to
r
”
class
is
d
ed
icate
d
to
s
ec
u
r
it
y
p
o
licies
co
llectio
n
.
“
Mo
n
i
to
r
”
class
co
n
tr
o
ls
all
th
e
Mo
b
ile
ag
e
n
t
s
an
d
k
ee
p
s
a
tr
ac
k
o
f
a
n
ag
en
t
tr
an
s
it
ti
m
e
an
d
its
tas
k
s
.
I
n
ca
s
e
a
Mo
b
ile
Ag
e
n
t
h
ad
s
to
p
p
ed
,
it
lau
n
ch
e
s
a
n
o
th
er
o
n
e
to
k
ee
p
th
e
w
o
r
k
g
o
in
g
.
“
Ho
s
t_
Ag
e
n
t”
clas
s
g
o
al
is
t
o
f
ac
ilit
ate
t
h
e
Mo
b
ile_
Ag
en
t
class
o
b
j
ec
ts
w
o
r
k
i
n
th
e
H
o
s
t.
I
t
p
r
o
v
id
es
in
s
ta
n
ce
d
is
co
v
er
y
an
d
li
f
ec
y
c
le
h
o
s
ti
n
g
.
“
Q
u
er
y
”
cla
s
s
s
er
v
es
a
s
an
i
d
en
tific
atio
n
o
f
th
e
d
i
f
f
er
en
t
task
s
h
a
n
d
led
an
d
co
n
tr
o
lled
b
y
t
h
e
Mo
b
ile
Ag
e
n
ts
.
“
Sec
u
r
it
y
_
P
o
licies” i
s
a
d
ir
ec
to
r
y
o
f
all
t
h
e
ap
p
r
o
v
ed
s
ec
u
r
it
y
p
o
licies.
Fig
u
r
e
9
.
T
h
e
f
r
am
e
w
o
r
k
’
s
cla
s
s
d
iag
r
a
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8938
IJ
-
AI
Vo
l.
8
,
No
.
3
,
Sep
tem
b
er
20
1
9
:
2
7
8
–
2
8
5
284
Fig
u
r
e
1
0
d
escr
ib
es th
e
in
ter
ac
tio
n
b
et
w
ee
n
t
h
e
m
a
in
o
b
j
ec
ts
o
f
ASR
Aaa
S.
Fig
u
r
e
1
0
.
T
h
e
Fra
m
e
w
o
r
k
’
s
s
eq
u
en
ce
d
iag
r
a
m
I
n
o
n
e
h
a
n
d
,
th
e
m
ain
ad
v
an
ta
g
es o
f
f
er
ed
b
y
th
e
i
n
tell
ig
e
n
t
R
is
k
Ma
n
a
g
e
m
e
n
t f
r
a
m
e
w
o
r
k
ar
e:
1.
An
E
ar
l
y
d
etec
tio
n
o
f
DDOS
attac
k
s
o
w
i
n
g
to
th
e
P
r
ev
en
ti
v
e
R
is
k
A
s
s
ess
m
e
n
t.
2.
A
f
le
x
ib
le
m
i
tig
at
io
n
o
f
t
h
e
k
n
o
w
n
SQ
L
in
j
ec
tio
n
s
attac
k
s
w
i
th
th
e
R
esp
o
n
s
ib
e
R
i
s
k
Ass
e
s
s
e
m
en
t
.
3.
R
ea
l
-
ti
m
e
m
o
n
ito
r
in
g
w
it
h
M
o
b
ile
A
g
e
n
t
s
d
etec
tin
g
s
u
s
p
is
o
u
s
c
h
an
g
es.
I
n
th
e
o
th
er
h
an
d
,
th
e
l
i
m
itatio
n
s
ar
e:
1.
A
s
e
m
i
-
q
u
a
n
titati
v
e
(
co
m
b
i
n
in
g
q
u
an
titati
v
e
a
n
d
q
u
al
itativ
e)
R
is
k
An
al
y
s
is
ap
p
r
o
ac
h
s
h
o
u
ld
also
b
e
co
n
s
id
er
ed
.
2.
R
esp
o
n
s
iv
e
R
is
k
A
s
s
es
s
m
en
t
o
n
l
y
ac
t
s
o
n
th
e
at
tack
s
id
en
ti
f
ied
b
y
t
h
e
P
r
ev
en
ti
v
e
R
i
s
k
A
s
s
ess
m
e
n
t.
3.
On
l
y
s
to
r
ed
attac
k
s
i
n
t
h
e
s
ec
u
r
it
y
Mo
d
el
-
b
ase
ca
n
b
e
m
iti
g
at
ed
.
4.
No
ex
p
er
i
m
en
tal
r
esu
lts
ar
e
p
r
o
v
id
ed
.
5.
A
co
n
tin
u
o
u
s
m
a
n
u
all
y
r
ef
lect
io
n
m
u
s
t b
e
co
n
s
id
er
ed
.
5.
CO
NCLU
SI
O
N
T
h
e
I
o
T
h
as
elev
ated
t
h
e
m
o
d
er
n
w
o
r
ld
to
a
n
e
w
er
lev
el
o
f
s
atis
f
ac
tio
n
an
d
ev
o
l
u
tio
n
.
I
n
t
h
is
p
ap
er
,
w
e
h
a
v
e
p
r
esen
ted
an
i
n
telli
g
e
n
t
R
i
s
k
Ma
n
ag
e
m
e
n
t
f
r
a
m
e
w
o
r
k
f
o
r
th
e
I
o
T
.
Usef
u
ll
y
,
it
co
n
s
id
er
s
d
ata
h
is
to
r
y
an
d
ac
ts
ta
k
i
n
g
i
n
to
ac
co
u
n
t
t
h
e
s
ec
u
r
it
y
Mo
d
el
-
b
ase.
T
h
e
f
r
a
m
e
w
o
r
k
p
r
o
v
id
es
id
y
ll
ic
s
o
lu
tio
n
s
to
p
r
eser
v
e
th
e
co
n
f
id
en
tiali
t
y
,
in
teg
r
it
y
an
d
a
v
ailab
ilit
y
o
f
th
e
I
o
T
d
ev
ices
ag
ai
n
s
t
m
al
f
u
n
ctio
n
b
eh
a
v
io
u
r
s
.
T
h
e
k
ey
ele
m
e
n
t
is
th
e
u
s
e
o
f
Mo
b
ile
Ag
en
t
s
.
I
n
f
ac
t,
th
e
y
d
id
n
o
t
h
a
v
e
an
in
c
lu
s
iv
e
c
o
n
tr
o
l
to
th
eir
d
ata
s
y
n
ch
r
o
n
izatio
n
s
in
ce
t
h
e
y
w
e
r
e
o
p
er
atin
g
in
th
e
I
o
T
d
y
n
a
m
ic
in
f
r
a
s
tr
u
ct
u
r
e.
Mo
r
eo
v
er
,
th
e
s
ec
u
r
it
y
Mo
d
el
-
b
ase
h
a
s
g
r
an
ted
t
h
e
Mo
b
ile
Ag
e
n
ts
w
it
h
a
co
m
m
o
n
in
ter
p
r
etatio
n
o
f
t
h
e
I
o
T
in
f
r
as
tr
u
ct
u
r
e
an
d
th
e
s
ec
u
r
it
y
p
o
licies.
T
h
e
in
tell
ig
e
n
t
f
r
a
m
e
w
o
r
k
is
p
r
ac
ticall
y
b
ased
o
n
co
llab
o
r
ativ
e
Mo
b
ile
A
g
e
n
ts
th
at
co
llect
d
ata,
an
al
y
ze
it
an
d
ac
t
o
n
it
ac
co
r
d
in
g
to
t
h
e
s
ec
u
r
it
y
s
tr
ate
g
y
.
Nev
er
th
e
less
,
o
u
r
w
o
r
k
also
i
n
clu
d
e
s
li
m
itatio
n
s
.
I
n
f
ac
t,
n
o
r
i
s
k
p
r
o
f
ile
i
s
g
en
er
ated
b
y
th
e
P
r
ev
en
ti
v
e
R
i
s
k
A
n
al
y
s
is
,
n
o
i
n
s
i
g
h
t
o
n
h
o
w
th
e
cr
itical
d
ev
ice
s
w
er
e
as
s
ess
ed
o
r
n
eit
h
er
n
o
t h
o
w
s
tat
is
tical
d
ata
w
a
s
ca
p
tu
r
e
d
.
Fu
t
u
r
e
w
o
r
k
s
h
o
u
ld
co
n
s
id
e
r
s
en
s
o
r
s
a
g
g
r
eg
ati
n
g
r
ea
l
-
t
i
m
e
d
ata
i
n
o
r
d
er
to
b
e
au
to
m
a
ticall
y
an
al
y
s
ed
b
y
t
h
e
Mo
b
ile
A
g
e
n
ts
.
T
h
e
g
en
er
al
id
ea
is
to
co
n
s
id
er
a
s
ec
u
r
it
y
Mo
d
el
-
b
a
s
e,
w
h
ich
i
n
co
r
p
o
r
ate
s
ec
u
r
it
y
r
u
le
s
ac
co
m
p
li
s
h
ed
b
y
th
e
P
r
ev
e
n
ti
v
e
R
is
k
A
s
s
e
s
s
m
en
t.
I
t
w
o
u
ld
e
v
id
en
tl
y
a
llo
w
s
u
p
p
o
r
tin
g
a
co
n
tin
u
o
u
s
R
is
k
A
s
s
es
s
m
e
n
t.
Fro
m
th
e
s
ec
u
r
it
y
Mo
d
el
-
b
ase
,
th
e
Mo
b
ile
A
g
e
n
t
w
i
ll
b
e
ab
le
to
d
eter
m
in
e
t
h
e
s
ec
u
r
it
y
s
tate
a
n
d
w
o
u
ld
f
u
r
th
er
p
er
f
o
r
m
a
R
e
s
p
o
n
s
i
v
e
R
is
k
A
s
s
es
s
m
e
n
t
b
y
tak
i
n
g
in
to
co
n
s
id
er
atio
n
h
is
to
r
ical
d
ata.
T
h
is
ea
s
il
y
tr
i
g
g
er
s
p
r
o
tectiv
e
m
ea
s
u
r
es.
An
o
th
er
r
e
s
ea
r
ch
tas
k
i
s
to
in
s
p
ec
t
Mo
b
ile
A
g
e
n
t
s
r
eliab
ilit
y
.
T
h
e
p
r
o
v
id
ed
i
n
tel
lig
e
n
t
R
is
k
Ma
n
a
g
e
m
e
n
t
f
r
a
m
e
w
o
r
k
is
in
d
ee
d
s
u
itab
le
f
o
r
ass
e
s
s
i
n
g
t
h
e
r
i
s
k
s
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
-
AI
I
SS
N:
2252
-
8938
I
n
tellig
en
t ris
k
ma
n
a
g
eme
n
t fr
a
mewo
r
k
(
Wis
s
a
m
A
b
b
a
s
s
)
285
f
ac
i
n
g
t
h
e
I
o
T
’
d
ev
ices,
b
u
t
is
tactle
s
s
l
y
n
o
t
th
e
u
lti
m
ate
s
ec
u
r
it
y
s
o
l
u
tio
n
.
I
t
i
s
a
co
n
ce
p
tu
al
f
o
u
n
d
atio
n
in
v
e
s
ti
g
ati
n
g
th
e
co
m
b
i
n
atio
n
o
f
p
r
ev
en
ti
v
e
an
d
r
esp
o
n
s
iv
e
r
is
k
a
s
s
es
s
m
en
t
i
n
o
r
d
e
r
to
p
r
eser
v
e
d
ata
co
n
f
id
e
n
tialit
y
,
in
teg
r
it
y
a
n
d
av
ailab
ilit
y
.
RE
F
E
R
E
NC
E
S
[1
]
J.
Bh
a
tt
a
c
h
a
rjee
,
A
.
S
e
n
g
u
p
ta,
M
.
S
.
Ba
rik
,
e
t
C.
M
a
z
u
m
d
a
r,
«
An
A
n
a
l
y
ti
c
a
l
S
tu
d
y
o
f
M
e
th
o
d
o
lo
g
ies
a
n
d
T
o
o
ls
f
o
r
En
terp
rise
In
f
o
r
m
a
ti
o
n
S
e
c
u
rit
y
Ris
k
M
a
n
a
g
e
m
e
n
t
»
,
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
Ri
sk
M
a
n
a
g
e
me
n
t
a
n
d
Co
mp
li
a
n
c
e
in
M
o
d
e
rn
Or
g
a
n
iza
t
io
n
s
,
IG
I
G
lo
b
a
l,
p
.
1
‑
2
0
,
2
0
1
8
.
[2
]
M
.
G
u
p
ta,
R
.
S
h
a
rm
a
n
,
J.
W
a
lp
,
e
t
P
.
M
u
lg
u
n
d
,
Éd
.
,
I
n
fo
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
R
isk
M
a
n
a
g
e
me
n
t
a
n
d
Co
mp
li
a
n
c
e
i
n
M
o
d
e
rn
Or
g
a
n
iza
ti
o
n
s:
IG
I
G
lo
b
a
l,
2
0
1
8
.
[3
]
B.
A
li
e
t
A
.
Aw
a
d
,
«
C
y
b
e
r
a
n
d
p
h
y
sic
a
l
se
c
u
rit
y
v
u
ln
e
ra
b
il
it
y
a
s
se
ss
m
e
n
t
f
o
r
Io
T
-
b
a
se
d
s
m
a
rt
h
o
m
e
s
»
,
S
e
n
so
rs
,
v
o
l.
1
8
,
n
o
3
,
p
.
8
1
7
,
2
0
1
8
.
[4
]
T
.
Qiu
,
N.
C
h
e
n
,
K
.
L
i,
M
.
A
ti
q
u
z
z
a
m
a
n
,
e
t
W
.
Zh
a
o
,
«
Ho
w
c
a
n
h
e
tero
g
e
n
e
o
u
s
I
n
tern
e
t
o
f
T
h
in
g
s
b
u
il
d
o
u
r
f
u
tu
re
:
A
su
rv
e
y
»
,
IEE
E
Co
mm
u
n
.
S
u
rv
.
T
u
to
r
.
,
v
o
l.
2
0
,
n
o
3
,
p
.
2
0
1
1
‑2
0
2
7
,
2
0
1
8
.
[5
]
V
.
A
d
a
t
e
t
B.
B.
G
u
p
ta,
«
S
e
c
u
rit
y
in
In
tern
e
t
o
f
T
h
in
g
s:
iss
u
e
s,
c
h
a
ll
e
n
g
e
s,
tax
o
n
o
m
y
,
a
n
d
a
rc
h
it
e
c
tu
re
»
,
T
e
lec
o
mm
u
n
.
S
y
st.
,
v
o
l
.
6
7
,
n
o
3
,
p
.
4
2
3
‑4
4
1
,
2
0
1
8
.
[6
]
A
.
A
.
Diro
e
t
N.
Ch
il
a
m
k
u
rti
,
«
Distrib
u
te
d
a
tt
a
c
k
d
e
tec
ti
o
n
sc
h
e
m
e
u
sin
g
d
e
e
p
lea
rn
in
g
a
p
p
ro
a
c
h
f
o
r
In
tern
e
t
o
f
T
h
in
g
s
»
,
Fu
tu
re
Ge
n
e
r.
Co
mp
u
t.
S
y
st.
,
v
o
l
.
8
2
,
p
.
7
6
1
‑7
6
8
,
2
0
1
8
.
[7
]
S.
-
R.
Oh
e
t
Y.
-
G
.
Ki
m
,
«
S
e
c
u
r
it
y
r
e
q
u
irem
e
n
ts
a
n
a
l
y
sis
f
o
r
th
e
Io
T
»
,
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Pl
a
tf
o
r
m
T
e
c
h
n
o
l
o
g
y
a
n
d
S
e
rv
ice
(
Pl
a
tCo
n
)
,
p
.
1
‑
6
,
2
0
1
7
.
[8
]
Z.
-
K.
Zh
a
n
g
,
M
.
C.
Y.
Ch
o
,
C.
-
W
.
W
a
n
g
,
C.
-
W
.
Hs
u
,
C.
-
K.
Ch
e
n
,
e
t
S
.
S
h
ieh
,
«
Io
T
S
e
c
u
rit
y
:
On
g
o
in
g
Ch
a
ll
e
n
g
e
s
a
n
d
Re
se
a
rc
h
Op
p
o
rtu
n
it
ies
»
,
in
2
0
1
4
IEE
E
7
th
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
S
e
rv
ice
-
Or
ien
ted
Co
mp
u
t
in
g
a
n
d
Ap
p
li
c
a
ti
o
n
s
,
M
a
tsu
e
,
Ja
p
a
n
,
p
.
2
3
0
‑
2
3
4
,
2
0
1
4
.
[9
]
J.
T
u
p
a
,
J.
S
im
o
ta,
e
t
F
.
S
tein
e
r,
«
A
sp
e
c
ts
o
f
risk
m
a
n
a
g
e
m
e
n
t
im
p
le
m
e
n
tatio
n
f
o
r
In
d
u
stry
4
.
0
»
,
Pro
c
e
d
ia
M
a
n
u
f.
,
v
o
l.
1
1
,
p
.
1
2
2
3
‑
1
2
3
0
,
2
0
1
7
.
[1
0
]
W
.
A
b
b
a
ss
,
A
.
B
a
in
a
,
e
t
M
.
Be
ll
a
f
k
ih
,
«
U
sin
g
EBIOS
f
o
r
risk
m
a
n
a
g
e
m
e
n
t
in
c
rit
ica
l
in
f
o
r
m
a
ti
o
n
in
f
ra
stru
c
tu
re
»
,
in
2
0
1
5
5
t
h
W
o
rl
d
Co
n
g
re
ss
o
n
In
fo
rm
a
t
io
n
a
n
d
C
o
mm
u
n
ica
ti
o
n
T
e
c
h
n
o
l
o
g
ies
(
W
ICT
)
,
M
a
rra
k
e
c
h
,
M
o
ro
c
c
o
,
p
.
1
0
7
‑1
1
2
,
2
0
1
5
.
[1
1
]
P
.
Ra
d
a
n
li
e
v
e
t
a
l.
, «
C
y
b
e
r
Risk
M
a
n
a
g
e
m
e
n
t
f
o
r
th
e
In
tern
e
t
o
f
Th
in
g
s
»
,
2
0
1
9
.
[1
2
]
P
.
Ra
d
a
n
li
e
v
e
t
a
l
.
,
«
F
u
tu
re
d
e
v
e
lo
p
m
e
n
ts
in
c
y
b
e
r
risk
a
ss
e
ss
m
e
n
t
f
o
r
th
e
in
ter
n
e
t
o
f
th
in
g
s
»
,
Co
mp
u
t.
In
d
.
,
v
o
l
.
1
0
2
,
p
.
1
4
‑2
2
,
2
0
1
8
.
[1
3
]
I.
S
telli
o
s,
P
.
Ko
tza
n
ik
o
la
o
u
,
M
.
P
sa
ra
k
is,
C.
A
lca
ra
z
,
e
t
J.
L
o
p
e
z
,
«
A
su
rv
e
y
o
f
io
t
-
e
n
a
b
led
c
y
b
e
ra
tt
a
c
k
s:
A
s
se
ss
in
g
a
tt
a
c
k
p
a
th
s
to
c
rit
ica
l
in
f
ra
st
ru
c
tu
re
s
a
n
d
se
rv
ic
e
s
»
,
IEE
E
Co
mm
u
n
.
S
u
rv
.
T
u
to
r.
,
v
o
l.
2
0
,
n
o
4
,
p
.
3
4
5
3
‑
3
4
9
5
,
2
0
1
8
.
[1
4
]
D.
E.
Ko
u
ice
m
,
A
.
Bo
u
a
b
d
a
ll
a
h
,
e
t
H.
L
a
k
h
lef
,
«
In
tern
e
t
o
f
th
in
g
s
se
c
u
rit
y
:
A
to
p
-
d
o
w
n
su
rv
e
y
»
,
Co
mp
u
t
.
Ne
tw.
,
v
o
l.
1
4
1
,
p
.
1
9
9
‑
2
2
1
,
a
o
û
t
2
0
1
8
.
[1
5
]
S
.
Zi
e
g
ler,
A
.
S
k
a
r
m
e
ta,
J.
Be
rn
a
l,
E.
E.
Kim
,
e
t
S
.
Bian
c
h
i
,
«
A
N
A
S
TA
CI
A
:
A
d
v
a
n
c
e
d
n
e
tw
o
rk
e
d
a
g
e
n
ts
f
o
r
se
c
u
rit
y
a
n
d
tru
st
a
ss
e
ss
m
e
n
t
in
CP
S
I
o
T
a
rc
h
it
e
c
tu
re
s
»
,
in
2
0
1
7
Glo
b
a
l
I
n
ter
n
e
t
o
f
T
h
i
n
g
s
S
u
mm
it
(
GIo
T
S
)
,
G
e
n
e
v
a
,
S
w
it
z
e
rlan
d
,
p
.
1
‑
6
,
2
0
1
7
.
[1
6
]
H.
A
b
ie
e
t
I.
Ba
las
in
g
h
a
m
,
«
Ris
k
-
b
a
se
d
a
d
a
p
ti
v
e
se
c
u
rit
y
f
o
r
s
m
a
rt
Io
T
in
e
He
a
lt
h
»
,
in
Pro
c
e
e
d
in
g
s
o
f
th
e
7
t
h
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
B
o
d
y
Are
a
Ne
two
rk
s
,
p
.
2
6
9
‑
2
7
5
,
2
0
1
2
.
[1
7
]
L
.
De
n
g
,
D.
L
i,
X
.
Ya
o
,
D.
Co
x
,
e
t
H.
W
a
n
g
,
«
M
o
b
il
e
n
e
tw
o
rk
in
tru
si
o
n
d
e
tec
ti
o
n
f
o
r
Io
T
sy
ste
m
b
a
se
d
o
n
tran
sf
e
r
lea
rn
in
g
a
lg
o
rit
h
m
»
,
Clu
st.
Co
mp
u
t.
,
2
0
1
8
.
[1
8
]
C.
L
iu
,
Y.
Z
h
a
n
g
,
J.
Zen
g
,
L
.
P
e
n
g
,
e
t
R.
C
h
e
n
,
«
Re
s
e
a
rc
h
o
n
Dy
n
a
m
ica
l
S
e
c
u
rit
y
Risk
A
s
s
e
ss
m
e
n
t
f
o
r
th
e
In
tern
e
t
o
f
T
h
in
g
s
in
sp
ire
d
b
y
imm
u
n
o
lo
g
y
»
,
8
th
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
N
a
t
u
ra
l
C
o
mp
u
ta
ti
o
n
,
C
h
o
n
g
q
in
g
,
S
ich
u
a
n
,
Ch
i
n
a
,
p
.
8
7
4
‑8
7
8
,
2
0
1
2
.
[1
9
]
J.
R.
C.
Nu
rse
,
S
.
Cre
e
se
,
e
t
D.
De
Ro
u
re
,
«
S
e
c
u
rit
y
Risk
A
ss
e
s
s
m
e
n
t
in
I
n
tern
e
t
o
f
T
h
in
g
s
S
y
st
e
m
s
»
,
IT
Pro
f.
,
v
o
l.
1
9
,
n
o
5
,
p
.
2
0
‑2
6
,
2
0
1
7
.
[2
0
]
W
.
A
b
b
a
ss
,
Z.
Ba
k
r
a
o
u
y
,
A
.
B
a
in
a
,
e
t
M
.
Be
ll
a
fk
ih
,
«
Clas
si
fy
in
g
Io
T
s
e
c
u
rit
y
risk
s
u
sin
g
De
e
p
Lea
rn
in
g
a
lg
o
rit
h
m
s
»,
6
th
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
W
ire
les
s
Ne
two
rk
s
a
n
d
M
o
b
il
e
Co
mm
u
n
ica
ti
o
n
s
(
W
IN
COM
)
,
M
a
rra
k
e
sh
,
M
o
ro
c
c
o
,
p
.
1
‑
6
,
2
0
1
8
.
[2
1
]
M
.
L
u
,
Arti
f
icia
l
in
telli
g
e
n
c
e
b
a
se
d
risk
a
n
d
k
n
o
wled
g
e
ma
n
a
g
e
me
n
t
.
G
o
o
g
le P
a
ten
ts,
2
0
1
9
.
Evaluation Warning : The document was created with Spire.PDF for Python.