Cyber Security Model for Threat Hunting | IEEE Conference Publication | IEEE Xplore