Fig. 1From: A flexible approach for cyber threat hunting based on kernel audit recordsSystem architecture of the hunting platformBack to article page