If a cyber attack is modeled as a signal in time, where can one find these various attack signals?

Similar questions and discussions