This paper is focused on the various ways in which threat hunting can be performed. It is based on the author’s research of semi-automating the entire process by creating a tool based on machine learning and applying analytics.
You can download it from the following link: https://packetstormsecurity.com/files/download/162850/the_game_of_threat_hunting.pdf
Source: https://packetstormsecurity.com/files/162850/The-Game-Of-Threat-Hunting.html