Fig. 2From: Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threatsSchematic description for an implicit violation of security policy example [16]Back to article page