Abstract: In the recent era, usage and demand of software devices are growing rapidly. Due to cause this, chances of cyberattacks and the vulnerability is also growing at the rapid rate. Therefore, ...