Generation of cyber attack data using generative techniques