Figure2_Observed_Attack_Techniques-1