Fig. 10From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionExample of graph signature in the EDL language [61]Back to article page