Cybersecurity Attacks: Detection and Mitigation