Fig. 8From: OMMA: open architecture for Operator-guided Monitoring of Multi-step AttacksExample of pheromone evolution if the attack hypothesis is confirmed. Parameters are in Table 2Back to article page