Closing the loop of SIEM analysis to Secure Critical Infrastructures