For the initial evaluation, we Examine whether or not the adversary strategies utilized In cases like this as well as the attack step connections are present in enterpriseLang. Determine eight demonstrates the attack graph with the Ukraine cyber attack; all of the attack methods are current and behave as predicted. https://ieeexplore.ieee.org/document/9941250