共 39 条
[11]
D. Enterprise, 2019, AUTOMATE THREAT HUNT
[13]
Garivier A., 2011, Journal of Machine Learning Research - Proceedings Track, V19, P359
[14]
Using Bandits for Effective Database Activity Monitoring
[J].
ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2020, PT II,
2020, 12085
:701-713
[15]
Haber M. J, 2018, THREAT HUNTING, P75, DOI [10.1007/978-1-4842-3048-0_7, DOI 10.1007/978-1-4842-3048-0_7]
[16]
I. Sqrrl Data, 2016, A framework for cyber threat hunting
[17]
I. Tyler Technologies, 2018, GUID CYB THREAT HUNT
[18]
Jasper SE, 2017, INT J INTELL COUNTER, V30, P53, DOI 10.1080/08850607.2016.1230701
[19]
Lattimore T, 2020, BANDIT ALGORITHMS, P1, DOI 10.1017/9781108571401
[20]
Liu Y, 2014, IFIP ADV INF COMM TE, V435, P161