Fig. 16From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionExample of an EDL signature called UserLogin for a simple login to a Windows system [88]Back to article page