Research Article

Network Intrusion Detection with Threat Agent Profiling

Figure 10

Decomposition of threat agents into two clusters. Visualization using the first two principal components.