Return to Article Details The Use of Automated Techniques in Cybersecurity Operations: Supporting Threat Detection and Information Assurance in Modern Information Systems Download Download PDF