"uhat" - Selaus asiasanan mukaan Kaakkois-Suomen ammattikorkeakoulu
Viitteet 1-1 / 1
-
Integrating Open Threat Exchange data in a Security Operations Center
(2021)Third party sources of cyber threat intelligence can be used to identify malicious network traffic in a security operations center (SOC). In this Bachelor's thesis, an open cyber threat intelligence source was integrated ...