Hunting Cyber Threats in the Enterprise Using Network Defense Log | IEEE Conference Publication | IEEE Xplore