Figure 2From: An approach to the correlation of security events based on machine learning techniques Hierarchy of objects. Back to article page