Figure 3From: Intrusion detection and Big Heterogeneous Data: a SurveySystem Architecture [[53]].Back to article page