for example, stockter was looking for a specific point when he wanted to attack. a point with a specific environmental condition that was the industrial site that he wanted to attack. what we do with the target defense approach is that we complicate the situation in a way that makes this attack model unable to accurately identify their target point and we challenge them. well, this was the first time. in the world , they were now maneuvering on this issue, that what we did will somehow challenge the attackers at the stage of identifying them and make it difficult for them. on the other hand, during the execution of the attack, despite the challenges that have been created that cause problems for the attacker , we try to identify during the execution of the attack with the elements that we have in the framework of risk management or risk management. to minimize a system designed to be usable in different and critical infrastructures has the country there were many projects that we had with the organization and the ministry of home affairs and important companies in