[1]
“IMPLEMENTING THREAT HUNTING STRATEGIES USING MITRE ATTACK FRAMEWORK”, JOAE, vol. 13, no. 3, pp. 12–33, Mar. 2025, Accessed: Apr. 30, 2026. [Online]. Available: http://joae.org/index.php/JOAE/article/view/77