After a threat is recognized, the threat reaction generates alerts or normally takes other motion to circumvent an attacker from accessing units or delicate facts. A great threat detection and response tool can halt a variety of cyber threats. Improved connectivity and ineffective security controls enable bigger usage of data https://ieeexplore.ieee.org/document/9941250