Formulation Of Association Rule Mining (ARM) For An Effective Cyber Attack Attribution In Cyber Threat Intelligence (CTI)

In recent year, an adversary has improved their Tactic, Technique and Procedure (TTPs) in launching cyberattack that make it less predictable, more persistent, resourceful and better funded. So many organisation has opted to use Cyber Threat Intelligence (CTI) in their security posture in attributin...

Full description

Saved in:
Bibliographic Details
Main Authors: Abu, Md Sahrom, Ariffin, Aswami, Yusof, Robiah, Selamat, Siti Rahayu
Format: Article
Language:English
Published: The Science And Information (SAI) Organization Limited 2021
Online Access:http://eprints.utem.edu.my/id/eprint/25367/2/PAPER_18-FORMULATION_OF_ASSOCIATION_RULE_MINING.PDF
http://eprints.utem.edu.my/id/eprint/25367/
https://thesai.org/Downloads/Volume12No4/Paper_18-Formulation_of_Association_Rule_Mining.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first