Research Article

Integrating Traffics with Network Device Logs for Anomaly Detection

Figure 8

Phishing attack reconstruction.