Figure 1From: An approach to the correlation of security events based on machine learning techniques Processing in stages or hierarchical layers. Back to article page