According to the literature published by

Md Sahrom Abu, Siti Rahayu Selamat, Robiah Yusof and Aswami Ariffin

Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI) was recommended as a good approach

Similar questions and discussions