Research Article

Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling

Figure 7

Flowchart of a pharming attack.