Fig. 13From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionInformation flow for intrusion detection data mining [75]Back to article page