According to the literature published by
Md Sahrom Abu, Siti Rahayu Selamat, Robiah Yusof and Aswami Ariffin
Formulation of Association Rule Mining (ARM) for an Effective Cyber Attack Attribution in Cyber Threat Intelligence (CTI) was recommended as a good approach