Organisation needs to spend their focus more on discovering the hidden knowledge behind the voluminous data to produce an effective cyberattack attribution. According to Md Sahrom Abu

Siti Rahayu Selamat, Robiah Yusof and Aswami Ariffin paper, the approach is through:

Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI)

Similar questions and discussions