security attacks mitigation Author Keyword