Fig. 9From: OMMA: open architecture for Operator-guided Monitoring of Multi-step AttacksExample of pheromone evolution if the attack hypothesis is refused. Parameters are in Table 2Back to article page