Abstract: Nowadays, when computer technology plays an important role in our lives, attackers develop new techniques and tools that target these systems. Over time, there were hundreds of papers ...