Fig. 1From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionThe attack timeline for zero-day attacks [12]Back to article page