To exhibit enterpriseLang, two enterprise procedure models of identified real-environment cyber attacks are shown working with an attack graph excerpted through the generic attack graph of enterpriseLang, which shows the attack ways and defenses for the pertinent process model assets, together with how they are related. Irregular site visitors patterns https://ieeexplore.ieee.org/document/9941250