Research Article

Use of Data Visualisation for Zero-Day Malware Detection

Figure 4

Visualisation of network connection types (what), resources (where) attacked, and the time (when).