Research Article

Network Intrusion Detection with Threat Agent Profiling

Figure 13

Decomposition of threat agents into two clusters without outliers. Visualization using the first two principal components.