Figure 1From: Intrusion detection and Big Heterogeneous Data: a Survey Illustration of Monitoring Heterogeneous Sources. Back to article page