Research Article

G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network

Figure 2

The flowchart for logical-match of greedy tree algorithm.