Research Article

Network Intrusion Detection with Threat Agent Profiling

Figure 11

Decomposition of threat agents into seven clusters. Visualization using the first two principal components.