That makes sense. First being finding some way to correlate the cyber-attack, a hard data set, to this data set for example, a Twitter data set.

Keyboard shortcuts

j previous speech k next speech