Fig. 1From: Graph-based visual analytics for cyber threat intelligenceCTI Vault of KAVAS. a Persisted Inventory Data (b) Enriched Inventory DataBack to article page