Indeed, organisation needs to spend their focus more on discovering the hidden knowledge behind the voluminous data to produce an effective cyberattack attribution. This may be carried out through the Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI). (Md Sahrom Abu

Siti Rahayu Selamat, Robiah Yusof and Aswami Ariffin paper.)

Similar questions and discussions