Fig. 9From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionSignature derivation steps for tainted analysis of multi-step attacks [61]Back to article page