Abstract: With the advances in cyber-attack techniques, cyber-criminals can easily plan attack scenarios and exploit them quickly. As a result, it is important for network defenders to emulate and ...