Fig. 2From: Graph-based visual analytics for cyber threat intelligenceHigh-level structure of KAVASBack to article page