Research Article

G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network

Figure 14

The detection rate of files’ transfer exception with 113 rules.