Fig. 2
From: Proactive identification of cybersecurity compromises via the PROID compromise assessment framework

Structured data collection levels for PROID endpoints.
From: Proactive identification of cybersecurity compromises via the PROID compromise assessment framework

Structured data collection levels for PROID endpoints.