Fig. 3From: Foundations and applications of artificial Intelligence for zero-day and multi-step attack detectionEvaluating the quality of anomaly detection rules [25]Back to article page