Table 4 Hypothetical Raw counts.

From: A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation

Technique ID

Mitigation Count

Detection Count

Groups Count

Campaigns Count

Software Count

A

1

3

10

4

20

B

4

1

5

2

10

C

0

2

2

1

5