Haku
Viitteet 1-1 / 1
Integrating Open Threat Exchange data in a Security Operations Center
(2021)
Third party sources of cyber threat intelligence can be used to identify malicious network traffic in a security operations center (SOC). In this Bachelor's thesis, an open cyber threat intelligence source was integrated ...