Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Peng GaoFei ShaoXiaoyuan LiuXusheng XiaoZheng QinFengyuan XuPrateek MittalSanjeev R. KulkarniDawn SongPublished in: ICDE (2021)
Keyphrases
- cyber crime
- crime investigation
- cyber security
- cyber physical
- identity theft
- cost effective
- law enforcement agencies
- information processing
- cyber defense
- data sets
- cyber attacks
- genetic algorithm
- data mining
- human intelligence
- intrusion detection
- situation awareness
- information technology
- multiscale
- website
- artificial intelligence
- information retrieval