Effective Cyber Threat Hunting: Where and how does it fit?

Nombeko Ntingi, Petrus Duvenage, Jaco du Toit, Sebastian von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Effective Cyber Threat Hunting: Where and how does it fit?'. Together they form a unique fingerprint.

Computer Science

Keyphrases