Fig. 7From: Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threatsEvent interception layers in the proposed approach [16]Back to article page