Fig. 15From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionA process for data-mining-supported security investigation [87]Back to article page