Fig. 3From: Forecasting cyberattacks with incomplete, imbalanced, and insignificant dataAn example of how cross correlation is used to find Δt and TlBack to article page