Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle | Publicación