Research Article

Use of Data Visualisation for Zero-Day Malware Detection

Figure 1

Visualisation of SSH brute force attempts.