Fig. 2From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionThe APT life-cycle by Mandiant [16]Back to article page