Figure2_Observed_Attack_Techniques