Fig. 6From: Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threatsData exfiltration from local network to the public network [16]Back to article page