Figure 3From: An approach to the correlation of security events based on machine learning techniques Model instantiation. Back to article page