slam method in cyber security