Open ivababukova-zz opened 9 years ago
I propose we only simulate the behaviour of these attacks, as implementing them in our system might no be realistic in terms of time and efficiency.
I propose we only simulate the behaviour of these attacks, as implementing them in our system might no be realistic in terms of time and efficiency.