Abstract: Various approaches exist when building a detection model to capture Cyber-Threats but most of these approaches employ a post-active methodology-trying to detect the threats after they have ...