“…This type of attack occurs due to the invasion of computers and systems, often by hackers. Through this invasion, valuable data and information can be leaked or even modified, all due to system vulnerabilities [2,11,19,24,[28][29][30][31][32]35,39,41,45,51,52,59,61,69,70,[75][76][77]82,84,97,111,125,[127][128][129][130].…”