Abstract: As the field of cybersecurity has experienced continual changes, up-to-date techniques have become increasingly necessary to analyze and defend against threats. Furthermore, the current ...