Fig. 4From: Graph-based visual analytics for cyber threat intelligenceTechnologies used in KAVASBack to article page