Articles with "targeted data" as a keyword



MABAT: A Multi-Armed Bandit Approach for Threat-Hunting

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3215010

Abstract: Threat hunting relies on cyber threat intelligence to perform active hunting of prospective attacks instead of waiting for an attack to trigger some pre-configured alerts. One of the most important aspects of threat hunting is… read more here.

Keywords: threat hunting; data collection; targeted data; threat ... See more keywords