Figure 7From: Intrusion detection and Big Heterogeneous Data: a SurveyBig Data and OT, IT Systemic Risk Management [[86]].Back to article page