That makes sense. First being finding some way to correlate the cyber-attack, a hard data set, to this data set for example, a Twitter data set.
j previous speech k next speech