A Threat Prioritization Method Using User Behavior Data for Cyber Threat Hunting
Vol. 46, No. 11, pp. 1853-1861, Nov. 2021
10.7840/kics.2021.46.11.1853
PDF Full-Text
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
S. Kim, S. Shim, S. Im, S. Koo, "A Threat Prioritization Method Using User Behavior Data for Cyber Threat Hunting," The Journal of Korean Institute of Communications and Information Sciences, vol. 46, no. 11, pp. 1853-1861, 2021. DOI: 10.7840/kics.2021.46.11.1853.
[ACM Style]
Sang-soo Kim, Shinwoo Shim, Sun-Young Im, and Sung-mo Koo. 2021. A Threat Prioritization Method Using User Behavior Data for Cyber Threat Hunting. The Journal of Korean Institute of Communications and Information Sciences, 46, 11, (2021), 1853-1861. DOI: 10.7840/kics.2021.46.11.1853.
[KICS Style]
Sang-soo Kim, Shinwoo Shim, Sun-Young Im, Sung-mo Koo, "A Threat Prioritization Method Using User Behavior Data for Cyber Threat Hunting," The Journal of Korean Institute of Communications and Information Sciences, vol. 46, no. 11, pp. 1853-1861, 11. 2021. (https://doi.org/10.7840/kics.2021.46.11.1853)