1. Baccas T, Gharakheili Habib H, Armita S (2021) Cyber threat hunting: a systematic review. Comput Secur 106:102295
2. Bandyopadhyay D, Joshi A, Dutt R, Chakraborty A (2019) Cyber threat hunting: an overview. Int J Netw Secur Appl 11(6):1–20
3. Bolukbasi T, Chang K-W, Zou JY, Saligrama V, Kalai A (2016) Man is to computer programmer as woman is to homemaker? debiasing word embeddings. In: Advances in neural information processing systems, pp 4349–4357
4. Bonawitz K, Ivanov V, Kreuter B, Marcedone A, Brendan McMahan H, Patel S, Yarmolinsky A (2019) Towards federated learning at scale: system design. arXiv preprint arXiv:1902.01046
5. Brown TB, Mann B, Ryder N, Subbiah M, Kaplan J, Dhariwal P, Amodei D (2020) Language models are few-shot learners. arXiv preprint arXiv:2005.14165