Community Support Scanning. Adversaries may perhaps make an effort to get a list of network products and services running within an business method through the use of network and vulnerability scanners, e.g. The MITRE ATT&CK Matrix is used for a know-how base, and MAL is employed as the underlying modeling https://ieeexplore.ieee.org/document/9941250