Research Article

Network Intrusion Detection with Threat Agent Profiling

Figure 4

Timeline of events for threat agent.