SEARCH Articles Figures Tables Attack scenarios nsed in evaluating the framework [Publishers Imprint]