Security resources often simplify the analysis cycle into a single atomic unit or a series of highly contextual steps rather than outline the process of building relationships in security data. Analysis workflows may be generalized for anomaly detection in positive security models. This paper...