Fig. 14From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionClassification of anomaly-based detection techniques [76]Back to article page