Figure 4From: Intrusion detection and Big Heterogeneous Data: a SurveyThe internal architecture of a local analyzer [[54]].Back to article page