Fig. 2From: A flexible approach for cyber threat hunting based on kernel audit recordsOntology of kernel audit for threat huntingBack to article page