Conduct your own research and discuss with the
Conduct your own research and discuss with the group the following: Field Techniques of Comparison? Rules for Based Matching? What is Fuzzy Matching? Bonus point How threat actors can evade detection via threat correlation ?...