Denial of services: the attacker exhausts the methods needed to offer solutions to legit people. To model a far more complicated state of affairs in which an adversary combines these two strategies, Asset 1 and Asset three are indirectly involved, plus the attack ways and defenses for these two assets https://ieeexplore.ieee.org/document/9941250