Threat Hunting as a Method of Protection Against Cyber Threats.
Nataliia Lukova-ChuikoAndriy FesenkoHanna PapirnaSergiy GnatyukPublished in: IT&I (2020)
Keyphrases
- detection method
- computationally efficient
- preprocessing
- pairwise
- mutual information
- significant improvement
- probabilistic model
- high accuracy
- high precision
- data sets
- optimization algorithm
- theoretical analysis
- prior knowledge
- computational complexity
- similarity measure
- support vector machine
- support vector machine svm
- information systems
- clustering method
- learning algorithm
- neural network