Author:
Elmisery Ahmed M.,Sertovic Mirela,Qasem Mamoun
Publisher
Springer International Publishing
Reference32 articles.
1. Dowdy, J.: The cyber-security threat to us growth and prosperity. In: Cyberspace: A New Domain for National Security (2012)
2. Friedberg, I., Skopik, F., Settanni, G., Fiedler, R.: Combating advanced persistent threats: from network event correlation to incident detection. Comput. Secur. 48, 35–57 (2015)
3. Connolly, L.Y., Wall, D.S.: The rise of crypto-ransomware in a changing cybercrime landscape: taxonomising countermeasures. Comput. Secur. 87, (2019)
4. Lord, N.: What is threat hunting? The emerging focus in threat detection. In: Digital Guardian (2018)
5. Sqrrl. Cyber Threat Hunting. www.sqrrl.com