Return to Article Details Build-A-Cyber-Attacker: Simulating Attackers to Reflect Myth and Folklore in Cyber Threat Analysis Download Download PDF