Primarily an adversary uses homoglyph or spoofing attack approach to obfuscate domain name. file name or process names. This approach facilitates to create domain name. file name or process names which look visually homogeneous to legitimate domain name. https://nstaiuat0ixqct.tokka-blog.com/35182889/local-models-for-rainstorm-induced-hazard-analysis-on-mediterranean-river-torrential-geomorphological-systems