Publisher
Springer Nature Switzerland
Reference30 articles.
1. Arafune, M., et al.: Design and development of automated threat hunting in industrial control systems. In: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 618–623. IEEE (2022)
2. Bagui, S.S., et al.: Introducing UWF-ZeekData22: a comprehensive network traffic dataset based on the MITRE ATT &CK framework. Data 8(1), 18 (2023)
3. Chakrabarti, S., Chakraborty, M., Mukhopadhyay, I.: Study of snort-based IDS. In: Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 43–47 (2010)
4. Chismon, D., Ruks, M.: Threat intelligence: collecting, analysing, evaluating. MWR InfoSecurity Ltd. 3(2), 36–42 (2015)
5. Daszczyszak, R., Ellis, D., Luke, S., Whitley, S.: Ttp-based Hunting. Tech. rep, MITRE CORP MCLEAN VA (2019)