Identification Of Security Threats Research Articles