Figure 7From: An approach to the correlation of security events based on machine learning techniques Detection by attack type using Bayesian network in DARPA W3xW2 experiment. Back to article page